Salesforce defends security practices after Qantas hack
Hackers used AI-powered voice phishing to trick employees into granting database access. â Read more
Sustainable practices could cut food-related emissions in half
Food systems make up roughly 30% of total greenhouse gas emissions globally. But transforming them could cut these emissions by more than half, according to a report released Oct. 3 from a commission of global experts from more than 35 countries across six continents. â Read more
âItâs a human rights tragedyâ: Aged care facility inappropriately restrained residents
A South Australian government aged care home, which looks after 23 people with dementia or complex disabilities, inappropriately used lap belts and other mechanical restraints to stop falls and control residentsâ behaviour, the ABC can reveal. â Read more
High-speed onion mist: Cutting technique and blade sharpness affect droplet spray, study shows
A new discovery about how cutting onions ejects pungent aerosols up to two-thirds of a meter into the air has led to practical advice for reducing the spray: Cut onions slowly with a sharpened blade or coat an onion in oil before cutting. â Read more
Vimscript Best Practices â Read more
Terasic Announces Starter Kit Featuring RISC-V Nios V Processor and Software Bundle
Terasic has introduced the Atum Nios V Starter Kit, a feature-rich evaluation platform designed to accelerate development with Alteraâs Nios V processor. The kit is aimed at embedded engineers, system developers, and educators looking for a practical way to explore RISC-Vâbased designs on the Agilex 3 FPGA platform. According to Terasicâs announcement, the kit is [âŚ] â Read more
Making yogurt with ants revives a creative fermentation process
Researchers recreated a nearly forgotten yogurt recipe that once was common across the Balkans and Turkeyâusing ants. Reporting in iScience on October 3, the team shows that bacteria, acids, and enzymes in ants can kickstart the fermentation process that turns milk into yogurt. The work highlights how traditional practices can inspire new approaches to food science and even add creativity to the dinner table. â Read more
url metadata field unequivocally treated as the canon feed url when calculating hashes, or are they ignored if they're not at least proper urls? do you just tolerate it if they're impersonating someone else's feed, or pointing to something that isn't even a feed at all?
      
    
    
    
    @zvava@twtxt.net My clients trusts the first url field it finds. If there is none, it uses the URL that Iâm using for fetching the feed.
No validation, no logging.
In practice, Iâve not seen issues with people messing with this field. (What I do see, of course, is broken threads when people do legitimate edits that change the hash.)
I donât see a way how anyone can impersonate anybody else this way. đ¤  Sure, you could use my URL in your url field, but then what? You will still show up as zvava in my client or, if you also change your nick field, as movq (zvava).
@bender@twtxt.net Absolutely. My computer science teacher was really great and in a lot of aspects very similar. Especially combining the theoretical and practical parts. Heâs also the main reason I ended up where I am today. Iâm very grateful to him. Mr. Burger, however, takes this on a whole new level.
@lyse@lyse.isobeef.org thatâs an amazing way to teach, and one many old school (I remember my father telling me âschools need to teach both theoretical and practical skills!â) people will agree with. The fact that graduates need to learn on the job after they graduate exemplifies the importance of hands on.
@movq@www.uninformativ.de Yeah, weâve seen how this plays out in practice 𤣠@dce@hashnix.club My advice, do what @movq@www.uninformativ.de has hinted at and donât change the 1st # url = field in your feed. Iâm not sure if you had already, but the first url field is kind of important in your feed as it is used as the âHashing URIâ for threading.
Victoria is in the grip of drought, but whatâs different about this one?
Victorian Country Hour host Warwick Long reflects on how farmers focus on mental health, modern farming practices and climate change preparation. â Read more
Queensland shark control plan goes against government commissioned advice
The KPMG report stresses that while âtraditional measuresâ are still required, the program needs to transition away from âenvironmentally harmful practicesâ, such as drumlines and mesh nets. â Read more
Victoriaâs Liberals struggles with compromise as infighting continues
So much of politics is the art of compromise. Itâs an art form the Victorian Liberals are unwilling to practice as the party once again rips itself apart over the fate of former leader John Pesutto. â Read more
Doctors flee Trumpâs America: âItâs no longer safe or sane to practice hereâ
Brett Kelman,  Kaiser Family Foundation Health News  -  Kaiseer Family Foundation | Raw Story
_Stephan: It is not only that the Republicans and Trump are trying to terminate the healthcare of millions of Americans. All of this dismantlement of the medical system in the U.S. is also causing a significant number of physicians to just leave the country, as this article describes. ⌠â Read more
How to Adjust Font Smoothing in macOS Sequoia & macOS Sonoma
Font Smoothing is a longstanding feature in MacOS that aims to make rendered screen text more legible, and it works by subtly blending the edges of display fonts with the background by using anti-aliasing. The idea is to reduce the jaggedness of screen text, but in practice nowadays it basically makes screen fonts on the ⌠[Read More](https://osxdaily.com/2025/06/04/how-adjust-font-smoothing-macos-sequoia-sonoma-v ⌠â Read more
[$] The importance of free software to science
Free software plays a critical role in science, both in research and in
disseminating it. Aspects of software freedom are directly relevant to
simulation, analysis, document preparation and preservation, security,
reproducibility, and usability. Free software brings practical and specific
advantages, beyond just its ideological roots, to science, while
proprietary software comes with equally specific risks. As a practicing
scientist, I would like to help othersâscientists or notâsee the  ⌠â Read more
Requirement for professional carpet cleaning at end of lease invalid, ruling finds
Renters in Tasmania are not required to have their carpets professionally cleaned at the end of their lease âas a matter of general practiceâ, the Residential Tenancy Commissioner has ruled. â Read more
How to Grow an LSM-tree? Towards Bridging the Gap Between Theory and Practice
Comments â Read more
10 Iconic âTemporaryâ Structures That Still Stand Today
Some of the worldâs most iconic structures were never meant to stick around. Built for the Worldâs Fairs, quick fixes, or temporary exhibitions, these buildings were supposed to be dismantled or demolished after serving their short-term purpose. But fateâand sometimes public opinionâhad other plans. Whether due to popularity, practicality, or sheer indifference, these âtemporaryâ constructions [âŚ]
The post [10 Iconic âTemp ⌠â Read more
[$] Glibc project revisits infrastructure security
The GNU C Library
(glibc) is the core C library for most Linux distributions, so it is a
crucial part of the open-source ecosystemâand an attractive
target for any attackers looking to carry out supply-chain
attacks. With that being the case, securing the projectâs
infrastructure using industry best practices and improving the
security of its development practices are a frequent topic among glibc
developers. A recent discussion suggests that improveme ⌠â Read more
Xi Jinpingâs plan to beat America at AI
Chinaâs leaders believe they can outwit American cash and capitalism with a focus on practical applications. â Read more
Agent mode 101: All about GitHub Copilotâs powerful mode
A full look at agent mode in GitHub Copilot, including what it can do, when to use it, and best practices.
The post Agent mode 101: All about GitHub Copilotâs powerful mode appeared first on The GitHub Blog. â Read more
CNCF Shares Schedule for Open Observability Summit North America, Gears Up for Inaugural Event
The event will unite observability leaders, developers, and end users to drive progress in observability tools and best practices SAN FRANCISCO, Calif., May 22, 2025 â The Cloud Native Computing FoundationÂŽ (CNCFÂŽ), which builds sustainable ecosystems⌠â Read more
10 Normal Items You Didnât Know Were Once Part of Burial Rituals
We tend to think of everyday objectsâpillows, perfumes, makeupâas inventions born from comfort, beauty, or practicality. But dig through the layers of history, and youâll find that some of these now-ordinary items have surprising ties to ancient burial rites, funerary customs, or corpse preparation. To be clear: not all of these items were originally invented [âŚ]
The post [10 Normal Items You Didnât Know ⌠â Read more
10 Evil Religions in Fiction
Religion is a source of comfort and conscience. As people look to their respective gods for guidance, their conclusions inform their values, drive their actions, and give meaning to events. However, that pattern isnât always a good thing, as some religious practices arenât so righteous. An ignoble doctrine could be a cheap excuse to set [âŚ]
The post 10 Evil Religions in Fiction appeared first on [Listverse](h ⌠â Read more
** Collaboration is a scary word  **
I like programming partially because itâs a practice I can, with appropriate to unhealthy application of effort, usually accomplish something at least proximal to my intention.
This isnât true for visual art, nor music. Lately Iâve been feeling like the little games and toys I wanna make are sorta hampered by my total inability to make stuff I find aesthetically appealingâŚsoâŚIâve been thinking about collaboration. Which is a scary word because, you know, other people and all, but I figured Iâd ⌠â Read more
@prologic@twtxt.net Absolutely! It is essential to practice and deepen every art đ
Copilot ask, edit, and agent modes: What they do and when to use them
An introduction to the three distinct modes of GitHub Copilot and a practical guide for integrating them effectively into your workflow.
The post Copilot ask, edit, and agent modes: What they do and when to use them appeared first on The GitHub Blog. â Read more
@andros@twtxt.andros.dev You know, Iâd really love to see how/if location-based addressing works in practice. I might fork jenny to judy and run both things in parallel for a while ⌠đ¤
CNCF Announces OpenObservabilityCon North America to Accelerate Open Source Innovation and Tame Infrastructure Complexity
New event will convene observability leaders, developers, and end users to advance open source observability tools and practices SAN FRANCISCO, April 22, 2025 â The Cloud Native Computing FoundationÂŽ (CNCFÂŽ), which builds sustainable ecosystems for cloud⌠â Read more
Exploring GitHub CLI: How to interact with GitHubâs GraphQL API endpoint
Discover practical tips and tricks for forming effective GraphQL queries and mutations.
The post Exploring GitHub CLI: How to interact with GitHubâs GraphQL API endpoint appeared first on The GitHub Blog. â Read more
Cracking the code: How to wow the acceptance committee at your next tech event
Want to speak at a tech conference? These four practical tips will help your session proposal stand outâand land you on the stage.
The post Cracking the code: How to wow the acceptance committee at your next tech event appeared fi ⌠â Read more
GitHub for Beginners: Security best practices with GitHub Copilot
Learn how to leverage GitHub Copilot to make your code more secure.
The post GitHub for Beginners: Security best practices with GitHub Copilot appeared first on The GitHub Blog. â Read more
Thereâs one way you can make your super more secure
Super funds are attractive targets for hackers, and recent attacks on funds have put the sectorâs security practices under the microscope. â Read more
Run Gemma 3 with Docker Model Runner: Fully Local GenAI Developer Experience
Explore how to run Gemma 3 models locally using Docker Model Runner, alongside a Comment Processing System as a practical case study. â Read more
Topaz Tz170 J484 Development Kit with 256 Mbit x32 LPDDR4 at 1.6 Gbps & MIPI D-PHY
The Topaz Tz170 J484 Development Kit is a compact platform for evaluating and prototyping with the Efinix Tz170 FPGA. It integrates onboard memory, configurable I/O, and a preloaded reference design, providing a practical setup for testing and demonstration across a range of FPGA applications. The development kit is built around the Tz170 FPGA, which uses [âŚ] â Read more
10 Crazy Cultural Practices from Deep History
Culture includes everything we do, believe, and have done to us. Culture comprises everything humanity has achieved and learned. Looking back into the deep past, we can better appreciate how our civilization has evolved over the vast sweep of millennia. Some of the following findings stretch back to the dawn of humanity itself, while others [âŚ]
The post [10 Crazy Cultural Practices from Deep History](https://listverse.com/2025/04/03/10-craz ⌠â Read more
Wow, this is a nice way to practice internationalization for our systems
https://i18n-puzzles.com
Open Policy Agent: Best Practices for a Secure Deployment
Thanks to its performance and adaptability, Open Policy Agent (OPA) is a common choice for managing policy-as-code. Nonetheless, security flaws can develop if OPA is abused or improperly designed, much as with any tool handling important⌠â Read more
Bit of an update, there is now a general licence for all my stuff:
âUnless projects are accompanied by a different license, Creative Commons apply (âBY-NC-NDâ for all art featuring the Canine mascot and âBY-NCâ for everything else).â
Itâs even included on my website, where most of the demand for a clear licence originated from:
 
In practice this changes nothing, as I was never enforcing anything more than this anyway and given permission for other use too. Now itâs just official that this is the baseline, of what can be done, without having to ask for permission first.
10 Pharmaceutical Scandals That Will Leave You Fuming
When large amounts of money are involved, companies have proven to do whatever it takes to protect their profits, even if Itâs unethical and illegal. The pharmaceutical industry is no stranger to illegal practices and scandals involving shady businesses, leading to more money. Some of the largest drug companies have faced backlash for price hikes, [âŚ]
The post [10 Pharmaceutical Scandals That Will Leave You Fuming](https://l ⌠â Read more
Automating NIS2 Compliance in Kubernetes with Kyverno: A Practical Guide
2025 is the year when NIS2 measures will start to bite. Is your platform team ready for the challenge? This post gives a brief overview of NIS2 in the context of platform engineering. Then it gives⌠â Read more
Full exposure: A practical approach to handling sensitive data leaks
Treating exposures as full and complete can help you respond more effectively to focus on what truly matters: securing systems, protecting sensitive data, and maintaining the trust of stakeholders.
The post Full exposure: A practical approach to handling sensitive data leaks appeared first on [The GitHu ⌠â Read more
10 Male Characters Played by Women
Casting can be counterintuitive. Studios often hire male actors for female characters and vice versa. Such decisions arenât that unusual, especially in this age of gender-swapping established stories. For better or worse, theyâre a fairly common practice nowadays, meaning they no longer draw the widespread attention they once did. Ironically, itâs the less overt examples [âŚ]
The post [10 Male Characters Played by Women](https://listverse.com/2025/03/09/10-male-c ⌠â Read more
10 Everyday Fashion Items That Were Originally Designed for War
History has a funny way of taking battlefield necessities and turning them into fashion statements. Some of the most stylish and essential pieces in our wardrobes started with a much more practical and sometimes downright deadly purpose. From keeping soldiers warm to ensuring they had room for extra ammo (or snacks, as we now use [âŚ]
The post [10 Everyday Fashion Items That Were Originally Designed for Wa ⌠â Read more
Aligning Language Practices for KubeCon + CloudNativeCon Japan and KubeCon + CloudNativeCon China
The global cloud native community thrives on diversity and collaboration, bringing together contributors, users, and enthusiasts worldwide. As we continue to grow and expand, we are committed to creating an inclusive and effective environment for learning⌠â Read more
Announcing the Kubernetes âShift Downâ Security Paper
The CNCF Kubernetes Policy Working group (WG) has just released the Shift Down Security paper to help educate the community about how organizations can leverage cloud native security best practices to address key business risks and⌠â Read more
10 Classic American Songs That Started in Minstrelsy
In the early 1800s, Americans used to enjoy minstrel shows. Essentially, watching white men dance and sing their hearts outâwhile wearing blackface and mocking African Americans. This practice continued into the 19th century, even being seen in Hollywood films and on TV. Minstrel shows have been called the first truly American form of theater. While [âŚ]
The post [10 Classic American Songs That Started in Minstrelsy](https://li ⌠â Read more
10 Famous Movie Villains Inspired by Real People
The best movie villains affect more than just the filmâs protagonist. They practically jump out of the screen and live in our nightmares. The only thing we call fall back on is that old comfort many of us learned when we were young, âItâs only a movie.â But time and time again, weâre reminded that [âŚ]
The post [10 Famous Movie Villains Inspired by Real People](https://listverse.com/2025/02/22/10-famous-movie-villains-inspired-by-real- ⌠â Read more
Short summary of Project2025 and Trumpâs plans for the US:
- Abolish the Federal Reserve 
 Why? To end what is seen as an unelected, centralized body that exerts too much influence over the economy and monetary policy, replacing it with a more transparent, market-driven approach.
- Implement a national consumption tax 
 Why? To replace the current federal income tax system, simplify taxation, and increase government revenue through a broader base that includes all consumers.
- Lower corporate tax rates 
 Why? To promote business growth, increase investment, and stimulate job creation by reducing the financial burden on companies.
- Deregulate environmental policies 
 Why? To reduce government intervention in the economy, particularly in energy and natural resources sectors, and to foster a more business-friendly environment.
- Restrict abortion access 
 Why? To align with conservative pro-life values and overturn or limit abortion rights, seeking to restrict the practice at a federal level.
- Dismantle LGBTQ+ protections 
 Why? To roll back protections viewed as promoting LGBTQ+ rights in areas like employment and education, in line with traditional family values.
- Eliminate diversity, equity, and inclusion (DEI) programs 
 Why? To end policies that are seen as divisive and to promote a merit-based system that prioritizes individual achievements over group identity.
- Enforce stricter immigration policies, including mass deportations and detentions 
 Why? To prioritize border security, reduce illegal immigration, and enforce existing laws more aggressively, as part of a broader strategy to safeguard U.S. sovereignty.
- Eliminate the Department of Education 
 Why? To reduce federal control over education and shift responsibilities back to local governments and private sectors, arguing that education decisions should be made closer to the community level.
- Restructure the Department of Justice 
 Why? To ensure the department aligns more closely with the administrationâs priorities, potentially reducing its scope or focus on areas like civil rights in favor of law-and-order policies.
- Appoint political loyalists to key federal positions 
 Why? To ensure that government agencies are headed by individuals who are committed to advancing the administrationâs policies, and to reduce the influence of career bureaucrats.
- Develop training programs for appointees to execute reforms effectively 
 Why? To ensure that political appointees are equipped with the knowledge and skills necessary to implement the proposed changes quickly and effectively.
- Provide a 180-day transition plan with immediate executive orders 
 Why? To ensure that the incoming administration can swiftly implement its agenda and make major changes early in its term without delay.
Do yâall agree with any/all/some of these poliices? Hmmm đ¤
KubeCon + CloudNativeCon Europe 2025 co-located event deep dive: OpenTofu Day Europe
Chair: Sebastian StadilApril 1, 2025 London OpenTofu Day is the best place to connect with the OpenTofu community. Itâs a fantastic place to talk shop with other infrastructure or platform engineers, trade stories, discuss best practices,⌠â Read more
Top 10 Strangest Things Done with Hearts Throughout History
Hearts can be seen everywhere when Valentineâs Day rolls aroundâfrom romantic cards adorned with hearts to heart-shaped chocolates and candies filling stores. But throughout history, humans have also done some strange (and less saccharine!) things with actual hearts, such as in the organ, not the symbol. Below, youâll find a few morbidly fascinating funerary practices, [âŚ]
The post [Top 10 Strangest Things Done w ⌠â Read more
another one would be to allow changing public keys over time (as it may be a good practice [0]). A syntax like the following could help to know what public key you used to encrypt the message, and which private key the client should use to decrypt it:
!<nick url> <encrypted_message> <public_key_hash_7_chars>
Also Iâd remove support for storing the message as hex, only allowing base64 (more compact, aiming for a minimalistic spec, etc.)
Unlocking Efficiency with Docker for AI and Cloud-Native Development
Learn how Docker helps you deliver secure, efficient applications by providing consistent environments and building on best practices that let you discover and resolve issues earlier in the software development life cycle (SDLC). â Read more
10 Book Adaptations You Forgot About
Books are an excellent source of inspiration for filmmakers. If they take a literary classic and adapt it to the screen, they practically guarantee the projectâs success. After all, the story already works on the page, so all the screenwriters have to do is translate it. Doing so will put the movie, TV show, or [âŚ]
The post 10 Book Adaptations You Forgot About appeared first on [Listvers ⌠â Read more
@prologic@twtxt.net YEAH itâs so cool!!! i was thinking about trying it as sorta practice for golang lol
i recorded my first camcorder video!!!! itâs just me practicing guitar after sooo long of not playing it. my acoustic, to be specific (well, itâs an electric acoustic thing but i can play it without plugging it in lol, i do have a stratocaster though). itâs capped at ~30 minutes because i used one mini DVD for it and decided i wasnât gonna use another one to extend the run time. so yeah. it was super fun! i hope i can share it soon, iâm ripping the disc with make MKV right now, then iâll re-encode to a web friendly format, and upload to my site and hope that works well
American doctors hate the health care system almost as much as you do
Dylan Scott,  Staff Writer  -  Vox
_Stephan: I recently talked with a friend of mine who is also one of my doctors and he told me how bad the hassle of being a physician trying to practice in the American illness profit system has become. Another of my physicians told me her group practice was sold to Optum, and she is now an employee, and not very happy about it. My wife goes to two do ⌠â Read more
10 Ridiculous Riffs on Robin Hood
Robin Hood is practically synonymous with heroism. In the face of oppression in medieval England, this folk figure stands up to the malicious Sheriff of Nottingham and the malevolent Prince John. His example helps rally the commoners into a formidable fighting force. Together with his band of outlaws, Robin takes from the rich and gives [âŚ]
The post 10 Ridiculous Riffs on Robin Hood appeared firs ⌠â Read more
One benefit with bluesky is your username is also a website. And not a clunky URL with slashes and such. I wish twtxt adopted that. I have advocated for webfinger to for twtxt to let us do something like it with usernames. Nostr has something like it
By default the bsky.social urls all redirect to their feeds like: hmpxvt.bsky.social
Many custom urls will redirect to some kind of linktree or just their feed cwebonline.com or la.bonne.petite.sour.is or if you are a major outlet just to your web presence like https://theonion.com⏠or https://netflix.com
Its just good SEO practice
Do all nostr addresses take you to the person if typed into a browser? That is the secret sauce.
No having to go to some random page first. no accounts. no apps to install. just direct to the person.
One benefit with bluesky is your username is also a website. And not a clunky URL with slashes and such. I wish twtxt adopted that. I have advocated for webfinger to for twtxt to let us do something like it with usernames. Nostr has something like it
By default the bsky.social urls all redirect to their feeds like: hmpxvt.bsky.social
Many custom urls will redirect to some kind of linktree or just their feed cwebonline.com or la.bonne.petite.sour.is or if you are a major outlet just to your web presence like https://theonion.com⏠or https://netflix.com
Its just good SEO practice
Do all nostr addresses take you to the person if typed into a browser? That is the secret sauce.
No having to go to some random page first. no accounts. no apps to install. just direct to the person.
How to generate unit tests with GitHub Copilot: Tips and examples
Learn how to generate unit tests with GitHub Copilot and get specific examples, a tutorial, and best practices.
The post How to generate unit tests with GitHub Copilot: Tips and examples appeared first on The GitHub Blog. â Read more
The future of customer service is here, and itâs making customers miserable
Emily Stewart,  Senior Correspondent  -  msn | Business Insider
Stephan:Â Another AI problem. I have personally experienced this problem, have you? Not with insurance, but with medical group practices, setting up appointments. I think this trend is going to get much worse.
⌠â Read moreGeorgia Fires Entire Maternal Mortality Panel After Reporting on Abortion Ban Deaths
Jessica Corbett,  Senior Editor  -  Common Dreams
_Stephan: If you look at the news coming out of the Red states what you see is the healthcare available to women is becoming more and more precarious. Here is the latest from Georgia. But what I am particularly seeing are four trends: First, OB/GYNs are leaving Republican-controlled Red states, practicing pr ⌠â Read more
How Fastly used Kubernetes to scale our platform engineering practice
Member post originally published on Fastlyâs blog by Hannah Aubry About five years ago, Fastly had a problem with scale. No, not our network. Fastlyâs network continues to scale effortlessly, including recently breezing past a 353⌠â Read more
CNCF Launches Technology Landscape Radar, Reference Architectures to Address Gaps in Cloud Native Ecosystem
CNCFâs End User Technical Advisory Board has compiled new materials to promote best practices and simplify the adoption of cloud native technologies  SALT LAKE CITY, Utah â KubeCon + CloudNativeCon North America â November 14, 2024⌠â Read more
Apple Faces Epic Games-Style China Lawsuit Over App Store Practices
A Chinese court has agreed to hear a lawsuit against Apple from Beijing Bodyreader, a developer seeking around $420,000 in damages after their childrenâs posture correction app was removed from the App Store in 2020.
_[Bloomberg](https://www.bloomberg.com/news/articles/2024-11-12/apple-fights-fortnite-like-china-lawsuit-ov ⌠â Read more
KubeCon + CloudNativeCon North America 2024 co-located event deep dive: Kubernetes on Edge
Co-chairs: Tina Tsou and Mars Toktonaliev November 12, 2024 Salt Lake City, Utah Kubernetes on Edge Day demonstrates edge computing is here, and itâs powered by Kubernetes. Weâre showcasing real-world use cases, best practices, and cutting-edge⌠â Read more
Diversity, inclusion, and belonging at GitHub in 2024
From advancing ethical AI practices to expanding open source learning for developers in Africa, discover how weâve fostered diversity, inclusion, and belonging this year.
The post Diversity, inclusion, and belonging at GitHub in 2024 appeared first on The GitHub Blog. â Read more
Docker at Cloud Expo Asia: GenAI, Security, and New Innovations
At Cloud Expo Asia 2024, Docker showcased its latest innovations in AI integration, security best practices, and product updates, highlighting how containers empower GenAI workflows and enable efficient, secure software development. â Read more
KubeCon + CloudNativeCon North America 2024 co-located event deep dive: Platform Engineering Day
Co-chairs: Paula Kennedy, Stacey Potter, Vijay Chintha November 12, 2024 Salt Lake City, Utah Platform Engineering Day focuses on solutions over tooling. We believe that Platform Engineering is a vital practice that helps organizations to increase their speed⌠â Read more
Docker Best Practices: Using ARG and ENV in Your Dockerfiles
Learn about the ARG and ENV instructions and explore how to use them in your Dockerfiles to make your images more configurable and easier to maintain. â Read more
Docker Best Practices: Using Tags and Labels to Manage Docker Image Sprawl
Learn best practices for using tags and labels to manage image sprawl in Docker container workflows. â Read more
More thoughts about changes to twtxt (as if we havenât had enough thoughts):
- There are lots of great ideas here! Is there a benefit to putting them all into one document? Seems to me this could more easily be a bunch of separate efforts that can progress at their own pace:
 
1a. Better and longer hashes.
1b. New possibly-controversial ideas like edit: and delete: and location-based references as an alternative to hashes.
1c. Best practices, e.g. Content-Type: text/plain; charset=utf-8
1d. Stuff already described at dev.twtxt.net that doesnât need any changes.
- We wonât know what will and wonât work until we try them. So Iâm inclined to think of this as a bunch of draft ideas. Maybe later when weâve seen it play out it could make sense to define a group of recommended twtxt extensions and give them a name. 
- Another reason for 1 (above) is: I like the current situation where all you need to get started is these two short and simple documents: 
 https://twtxt.readthedocs.io/en/latest/user/twtxtfile.html
 https://twtxt.readthedocs.io/en/latest/user/discoverability.html
 and everything else is an extension for anyone interested. (Deprecating non-UTC times seems reasonable to me, though.) Having a big long âtwtxt v2â document seems less inviting to people looking for something simple. (@prologic@twtxt.net you mentioned an anonymous comment âyouâve ruined twtxtâ and while I donât completely agree with that commenterâs sentiment, I would feel like twtxt had lost something if it moved away from having a super-simple core.)
- All that being said, these are just my opinions, and Iâm not doing the work of writing software or drafting proposals. Maybe I will at some point, but until then, if youâre actually implementing things, youâre in charge of what you decide to make, and Iâm grateful for the work. 
@prologic@twtxt.net Thanks for writing that up!
I hope it can remain a living document (or sequence of draft revisions) for a good long time while we figure out how this stuff works in practice.
I am not sure how I feel about all this being done at once, vs. letting conventions arise.
For example, even today I could reply to twt abc1234 with â(#abc1234) Edit: âŚâ and I think all you humans would understand it as an edit to (#abc1234). Maybe eventually it would become a common enough convention that clients would start to support it explicitly.
Similarly we could just start using 11-digit hashes. We should iron out whether itâs sha256 or whatever but thereâs no need get all the other stuff right at the same time.
I have similar thoughts about how some users could try out location-based replies in a backward-compatible way (append the replyto: stuff after the legacy (#hash) style).
However I recognize that Iâm not the one implementing this stuff, and itâs less work to just have everything determined up front.
Misc comments (I havenât read the whole thing):
- Did you mean to make hashes hexadecimal? You lose 11 bits that way compared to base32. Iâd suggest gaining 11 bits with base64 instead. 
- âClients MUST preserve the original hashâ â do you mean they MUST preserve the original twt? 
- Thanks for phrasing the bit about deletions so neutrally. 
- I donât like the MUST in âClients MUST follow the chain of reply-to referencesâŚâ. If someone writes a client as a 40-line shell script that requires the user to piece together the threading themselves, IMO we shouldnât declare the client non-conforming just because they didnât get to all the bells and whistles. 
- Similarly I donât like the MUST for user agents. For one thing, you might want to fetch a feed without revealing your identty. Also, it raises the bar for a minimal implementation (Iâm again thinking again of the 40-line shell script). 
- For âwho followsâ lists: why must the long, random tokens be only valid for a limited time? Do you have a scenario in mind where they could leak? 
- Why canât feeds be served over HTTP/1.0? Again, thinking about simple software. I recently tried implementing HTTP/1.1 and it wasnât too bad, but 1.0 would have been slightly simpler. 
- Why get into the nitty-gritty about caching headers? This seems like generic advice for HTTP servers and clients. 
- Iâm a little sad about other protocols being not recommended. 
- I donât know how I feel about including markdown. I donât mind too much that yarn users emit twts full of markdown, but Iâm more of a plain text kind of person. Also it adds to the length. I wonder if putting a separate document would make more sense; that would also help with the length. 
Iâm still more in favor of (replyto:âŚ). Itâs easier to implement and the whole edits-breaking-threads thing resolves itself in a ânaturalâ way without the need to add stuff to the protocol.
Iâd love to try this out in practice to see how well it performs. đ¤ Itâs all very theoretical at the moment.
Kubecon + CloudNativeCon North America 2024 co-located event deep dive: Data on Kubernetes Day
Co-chairs: Melissa Logan and Adam DurrNovember 12, 2024Salt Lake City, Utah Organizations like Etsy, Grab, Dish Network, and Chick-fil-A have standardized on Kubernetes and shared best practices for running different types of stateful workloads. Our aim for the⌠â Read more
One distinct disadvantage of (replyto:âŚ) over (edit:#): (replyto:âŚ) relies on clients always processing the entire feed â otherwise they wouldnât even notice when a twt gets updated. a) This is more expensive, b) you cannot edit twts once they get rotated into an archived feed, because there is nothing signalling clients that they have to re-fetch that archived feed.
I guess neither matters that much in practice. Itâs still a disadvantage.
Iâm not advocating in either direction, btw. I havenât made up my mind yet. đ Just braindumping here.
The (replyto:âŚ) proposal is definitely more in the spirit of twtxt, Iâd say. Itâs much simpler, anyone can use it even with the simplest tools, no need for any client code. That is certainly a great property, if you ask me, and itâs things like that that brought me to twtxt in the first place.
Iâd also say that in our tiny little community, message integrity simply doesnât matter. Signed feeds donât matter. I signed my feed for a while using GPG, someone else did the same, but in the end, nobody cares. The community is so tiny, thereâs enough âimplicit trustâ or whatever you want to call it.
If twtxt/Yarn was to grow bigger, then this would become a concern again. But even Mastodon allows editing, so how much of a problem can it really be? đ
I do have to âadmitâ, though, that hashes feel better. It feels good to know that we can clearly identify a certain twt. It feels more correct and stable.
Hm.
I suspect that the (replyto:âŚ) proposal would work just as well in practice.
@quark@ferengi.one Mine is a little overkill đ but I need to do something for practice:
#!/bin/bash
set -e
trap 'echo "!! Something went wrong...!!"' ERR
#============= Variables ==========#
# Source files
LOCAL_DIR=$HOME/twtxt
TWTXT=$LOCAL_DIR/twtxt.txt
HTML=$LOCAL_DIR/log.html
TEMPLATE=$LOCAL_DIR/template.tmpl
# Destination
REMOTE_HOST=remotHostName     # Host already setup in ~/.ssh/config
WEB_DIR="path/to/html/content"
GOPHER_DIR="path/to/phlog/content"
GEMINI_DIR="path/to/gemini-capsule/content"
DIST_DIRS=("$WEB_DIR" "$GOPHER_DIR" "$GEMINI_DIR")
#============ Functions ===========#
# Building log.html:
build_page() {
	twtxt2html -T $TEMPLATE $TWTXT > $HTML
}
# Bulk Copy files to their destinations:
copy_files() {
	for DIR in "${DIST_DIRS[@]}"; do
    # Copy both `txt` and `html` files to the Web server and only `txt`
    # to gemini and gopher server content folders
		if [ "$DIR" == "$WEB_DIR" ]; then
			scp -C "$TWTXT" "$HTML" "$REMOTE_HOST:$DIR/"
		else
			scp -C "$TWTXT" "$REMOTE_HOST:$DIR/"
		fi
	done
}
#========== Call to functions ===========$
build_page && copy_files
CNCF and the Linux Foundation partner with Unified Patents on a community-driven approach to safeguard open source innovation from patent trolls
Now is the time for the open source ecosystem to band together and find strength in numbers  CNCF and The Linux Foundation are expanding their partnership with Unified Patents to protect open source software from non-practicing entities (NPEs), c ⌠â Read more
Fine-tuned models are now in limited public beta for GitHub Copilot Enterprise
Fine-tuned models empower organizations to receive code suggestions specifically tailored to their coding practices and internal languages.
The post Fine-tuned models are now in limited public beta for GitHub Copilot Enterprise appeared ⌠â Read more
@prologic@twtxt.net I believe you when you say registries as designed today do not crawl. But when I first read the spec, it conjured in my mind a search engine. Now I donât know how things work out in practice, but just based on reading, I donât see why it canât be an API for a crawling search engine. (In fact I donât see anything in the spec indicating registry servers shouldnât crawl.)
(I also noticed that https://twtxt.readthedocs.io/en/latest/user/registry.html recommends âThe registries should sync each others user list by using the users endpointâ. If I understood that right, registering with one should be enough to appear on others, even if they donât crawl.)
Does yarnd provide an API for finding twts? Is it similar?
How to build an open source metrics dashboard
How GitHub volunteers built an open source metrics dashboard for the World Health Organization and some best practices they picked up along the way.
The post How to build an open source metrics dashboard appeared first on The GitHub Blog. â Read more
Docker Best Practices: Understanding the Differences Between ADD and COPY Instructions in Dockerfiles
What are Docker ADD/COPY instructions and when should you use them? We explain the differences between the ADD and COPY instructions in Dockerfiles, including when to use each based on security, functionality, and build context. â Read more
Introducing Docker Build Checks: Optimize Dockerfiles with Best Practices
Find out how the newly released Docker Build checks help your team learn and follow best practices for building container images. â Read more
Spain Launches Investigation Into Appleâs App Store
Spainâs competition authority has launched an investigation into Appleâs App Store over potential anti-competitive practices that could result in hefty fines (via Reuters).
![](https://images.macrumors.com/article-new/2022/01/iOS-App-Store-General-Feature-Black ⌠â Read more
Esports for old folks: Nintendo turns classic games into bite-sized challenges
Nintendo World Championships: NES Edition challenges you to practice getting mushrooms as Mario or the Triforce as Link, faster than anyone else. â Read more
I never felt emotional about my email address, until they tried to take it from me
This shake-up by the telcos goes beyond practical inconvenience. Itâs an emotional wrench â a loss of identity. â Read more
Docker Best Practices: Choosing Between RUN, CMD, and ENTRYPOINT
Learn how to optimize Docker command use with our best practices guide on RUN, CMD, and ENTRYPOINT Dockerfile instructions. â Read more
Advancing responsible practices for open source AI
Outcomes from the Partnership on AI and GitHub workshop.
The post Advancing responsible practices for open source AI appeared first on The GitHub Blog. â Read more
Understanding the Docker USER Instruction
Discover best practices and common pitfalls associated with the Docker USER instruction. Also get a hands-on demo to learn the importance of these practices. â Read more
How to Measure DevSecOps Success: Key Metrics Explained
Discover two key metrics to measure your DevSecOps progression effectively. Learn how tracking security vulnerabilities over time and ensuring compliance with security policies can enhance your organizationâs security posture, driving continuous improvement in your DevSecOps practices. â Read more