Daily Shaarli
April 4, 2022
Junior and senior dev Point of view of a bug, and a bigger bug
Why are lockfiles critical for supply chain ?
You are protected from a silent update of the package at the same version.
The articles provide a table with the different related commands 👍
A schema of skills about influence, technology, system, people and process
La Bibliothèque Nationale de France (BNF) propose PressReader, un kiosque numérique pour 15€ / an.
- Télécharger l'app, créer un compte sur https://inscriptionbilletterie.bnf.fr/
- Prendre la pass BNF Lecture / Culture illimitée sur https://inscriptionbilletterie.bnf.fr/
- Attendre quelques jours et recevoir le courriel
- Se connecter sur la plateforme: https://bdl.bnf.fr/bases-de-donnees-par-titre et chercher PressReader
- Se connecter
(6.) Lors de l'accès à un titre, vous verrez ce message en jaune, mais pas de panique, pour réinitialiser le compteur, il suffit de se déconnecter puis de se reconnecter depuis https://bdl.bnf.fr/bases-de-donne
Un accès rapide: https://easybnf.fr/
You think you are browsing the web, when in reality, Google and others are browsing you. -- extracting your experiences without your awareness, your knowledge, or your consent.
Putting ️ disable the previous emoji and render it as character
︎ renders it as an emoji
Minimal web framework based on XML syntax
Focus on privacy, protection against malicious code; encryption (of everything); extending the web; make it fast; easy to publish; customization per user; first-class experience for non-English-speakers; improve accessibility
The "utf8" encoding only supports three bytes per character. The real UTF-8 encoding - which everybody uses, including you - needs up to four bytes per character.
So use utf8mb4
DDoS attack, distributed denial of service attack. ➡️ attaque collective par saturation de service (ACSS).
denial of service attack, DoS attack. ➡️ attaque par interruption de service (AIS).
distributed denial of service attack, DDoS attack. ➡️ attaque collective par saturation de service.
DoS attack, denial of service attack. ➡️ attaque par interruption de service.
phreaking, telephone hack, telephone hijack. ➡️ escroquerie téléphonique.
SIM swapping. ➡️ usurpation de carte SIM.
swatting ➡️ alerte malveillante.
telephony denial of service (TDoS). ➡️
attaque par saturation téléphonique (AST).
A sort of MIT-based licence, in which everything not prohibited is permitted.
There is also the Normally closed licence, in which everything not permitted is prohibited
But as Forbes reports, they have done it officially for tracking the chinese opioid sales.
Since the beginning of the year, 100 millions of request are made everyday. A record is registered the 10th of january with 110 millions of requests.
Stats about DDG are available here: https://duckduckgo.com/traffic
Syntax, timing function, looped animation, multi-step animation, alternating animations, shorthand values, fill modes (forwards and backwards), dynamic animations with CSS variables