Programming Leftovers

- 
            Jiri Eischmann: Bisecting Regressions in Fedora SilverblueI know that some blog posts on this topic have already been published, but nevertheless I have decided to share my real-life experience of bisecting regressions in Fedora Silverblue. My work laptop, Dell XPS 13 Plus, has an defective chip maker Intel IPU6 webcam. It still lacks upstream drivers, so I have to use RPMFusion packages containing Intel’s software stack to ensure the webcam’s functionality. 
- 
            Peter 'CzP' Czanik ☛ The syslog-ng Insider 2024-02: OpenObserve; configuration check; build services;The February syslog-ng newsletter is now on-line: [...] 
- 
            Peter Czanik: The syslog-ng Insider 2024-02: OpenObserve; configuration check; build services;Dear syslog-ng users, This is the 117th issue of syslog-ng Insider, a monthly newsletter that brings you syslog-ng-related news. 
- 
            Hackaday ☛ Linux Fu: Curling CSometimes, it pays to read the man pages of commands you use often. There might be a gem hidden in there that you don’t know about. Case in point: I’ve used curl (technically, cURL, but I’m going to stick with curl) many times to grab data from some website or otherwise make a web request. But what happens if you want to do the same thing from a C program? Well, you could be lazy and just spawn a copy of curl. But it turns out curl has a trick up its sleeve that can help you. If only I’d read the man page sooner! 
- 
            Barry Kauler ☛ woofV topological sortIf you have ever used Woof, the Puppy-builder, or even as a user of Puppy, you may be familiar with /root/.packages/woof-installed-packages. Or, in recent Woof-CE-built pups, it is at /var/packages/woof-installed-packages. This has a list of the packages that are "builtin", in "Puppy DB" format. By builtin, that means that are in the SFS(s); in the case of EasyOS that is 'easy.sfs'. Here is an example of one line in that file: argon2-20190702_3|argon2|20190702|3|Personal;lock|16K|current|argon2-20190702_3.x86_64.xbps|+glibc|Password hashing function|void|current|| 
- 
            KDAB ☛ Optimizing Embedded Product DesignChoosing the right system-on-chip (SoC) is probably your first consideration when designing an embedded product, followed closely by deciding whether to use an off-the-shelf board or design your own. 
- 
                R- 
                        Rlang ☛ Discrimination by proxy (a real case study)Yesterday, with Laurence Barry, we posted a blog post “Who benefits from data sharing?” explaining why data sharing, in insurance, could end mutualization. 
- 
                        Rlang ☛ Conquering R’s Apply Family: Your Guide to apply(), lapply(), sapply(), and tapply()Welcome, fellow R warriors! Today, we delve into the heart of vectorized operations with R’s “apply” family: apply(), lapply(), sapply(), and tapply(). 
- 
                        Rlang ☛ Introducing rOpenSci Champions – Cohort 2023-2024The rOpenSci Champions Program starts this 2024 with a new cohort of Champions. We are pleased to introduce you to our Champions and their projects! 
 
- 
                        
- 
                Java- 
                        Creating and Searching Embeddings in Java with Hugging Face APIIn the field of natural language processing (NLP), embeddings play a crucial role in representing text data in a numerical format that machine learning models can understand. Embeddings capture semantic information about words, phrases, or sentences, enabling various NLP tasks such as sentiment analysis, text classification, and machine translation. 
 
-