Autonomie numérique et technologique

Code et idées pour un internet distribué

Linkothèque. Carnet de bord. Page 2


Over-fetching is fetching too much data, meaning there is data in the response you don’t use.

Under-fetching is not having enough data with a call to an endpoint, forcing you to call a second endpoint.

In both cases, they are performance issues: you either use more bandwidth than ideal, or you are making more HTTP requests than ideal.

So, you end up with a compromise between not having too many endpoints, and having the endpoints fit each component needs best. This will lead to over-fetching in some cases (the endpoint will provide more data than needed for one specific component), and under-fetching in some others (you will need to call a second endpoint).

GraphQL fixes this problem because it allows you to request which data you want from the server. You specify what you need and will get this data, and only this data, in one trip to the server.

Google has a new way to power its data centers. According to a blog post from Google, a « first-of-its-kind » geothermal project in Arizona that uses modern oil and gas industry drilling techniques to optimize geothermal power generation is operational, as of today. Google says this « enhanced geothermal energy » is capable of producing round-the-clock clean energy cheaper than any other currently available method.

Captura de pantalla de datacentermap.com

Launched in 2007, Data Center Map was the first research tool of its kind. We operate a global data center database, mapping data center locations worldwide. Our intention is to make it easier for buyers, sellers, investors, regulators and other professionals in the data center industry, to gain insights in to the data center markets of their interest.

We currently have 7945 data centers listed, from 152 countries worldwide. Click on a country below, to explore its data center locations.

Our database contains lists of data center operators and service providers, offering colocation, cloud and connectivity.

¿Qué le parece que se juzguen otras canciones suyas, como ‘Sí, sí’, desde la óptica actual de la híper-literalidad?

Todos debemos intentar luchar contra eso. Creo que el arte debe ser territorio salvaje, sin normas morales ni éticas. Una plasmación gráfica del subconsciente. Y el subconsciente no tiene normas éticas. Por eso no debemos juzgar el arte con las normas morales con las que juzgamos los hechos civiles. Es abstracto por definición, y es estúpido y medieval aplicarle normas referidas al machismo, al feminismo, al racismo, a la violación o a lo que sea. Vaya usted a saber qué quería decir el autor. El arte es precisamente la huida de lo literal. Bastante literal es que te atropelle un coche. Ni los autores sabemos que estamos escribiendo como para juzgarlo moralmente y castigarlo. Es muy peligroso y creo que se está cargando el arte.

# Install new PHP 8.3 packages
sudo apt install php8.3 php8.3-cli php8.3-{bz2,curl,mbstring,intl}# Install FPM OR Apache module
sudo apt install php8.3-fpm
# OR
# sudo apt install libapache2-mod-php8.2# On Apache: Enable PHP 8.3 FPM
sudo a2enconf php8.3-fpm
# When upgrading from an older PHP version:
sudo a2disconf php8.2-fpm## Remove old packages
sudo apt purge php8.2*

Rclone is a command-line program to manage files on cloud storage. It is a feature-rich alternative to cloud vendors’ web storage interfaces. Over 70 cloud storage products support rclone including S3 object stores, business & consumer file storage services, as well as standard transfer protocols.

SQLite es el DBMS más común del mundo, incluido en todos los sistemas operativos populares.
SQLite no tiene servidor.
Para quienes desarrollan, SQLite está integrado directamente en la aplicación.
Para todos los demás, existe una conveniente consola de base de datos (REPL), que se proporciona como un solo archivo (sqlite3.exe en Windows, sqlite3 en Linux / macOS).

1. Avoid var Keyword: A Relic of the Past

Before ES6, the var keyword was the primary way to declare variables. However, it had some quirks and limitations that often led to unexpected results and made debugging more challenging.

In modern JavaScript, we generally avoid using var and instead opt for let and const, which offer more predictable and block-scoped behavior, making your code easier to understand and maintain.

2. let: Variables That Can Change

Use the let keyword to declare variables whose values you might need to change later in your code.

3. const: Constants for Unchanging Values:

If you have a value that shouldn’t change throughout your program, use the const keyword.

A good rule of thumb is to use const by default and only switch to let if you know you’ll need to reassign the variable’s value later.

Is that an unpopular opinion? It’s always been my favorite track on abbey road. You never give me your money, the end and she came in throught the bathroom window are the three tracks from the medley that never get old for me while golden slumbers and carry that weight’s big impact from the first listen diminished greatly in repeated listenings. Same goes for let it be, the song not the album.

In contrast to the White Album and Let It Be, Abbey Road – released in September 1969 – found The Beatles operating relatively cohesively; attempting to pull together, in step with one another if not exactly on the same page. « Abbey Road was really unfinished songs all stuck together, » bemoaned John Lennon. « None of the songs had anything to do with each other, no thread at all.”

It was the final collection of songs The Beatles recorded together…

nmap is a network mapping tool. It works by sending various network messages to the IP addresses in the range we’re going to provide it with it. It can deduce a lot about the device it is probing by judging and interpreting the type of responses it gets.

Let’s kick off a simple scan with nmap. We’re going to use the -sn (scan no port) option. This tells nmap to not probe the ports on the devices for now. It will do a lightweight, quick scan.

Even so, it can take a little time for nmap to run. Of course, the more devices you have on the network, the longer it will take. It does all of its probing and reconnaissance work first and then presents its findings once the first phase is complete. Don’t be surprised when nothing visible happens for a minute or so.

The IP address we’re going to use is the one we obtained using the ip command earlier, but the final number is set to zero. That is the first possible IPAddress on this network. The « /24 » tells nmap to scan the entire range of this network. The parameter « 192.168.4.0/24 » translates as « start at IP address 192.168.4.0 and work right through all IP addresses up to and including 192.168.4.255 ».

Note we are using sudo.

sudo nmap -sn 192.168.4.0/24
  1. lspci command : List all PCI devices.
  2. lshw command : Linux identify Ethernet interfaces and NIC hardware.
  3. dmidecode command : List all hardware data from BIOS.
  4. ifconfig command : Outdated network config utility.
  5. ip command : Recommended new network config utility.
  6. hwinfo command : Probe Linux for network cards.
  7. ethtool command : See NIC/card driver and settings on Linux.
Captura de pantalla de survey.stackoverflow.co/2024

In May 2024, over 65,000 developers responded to our annual survey about coding, the technologies and tools they use and want to learn, AI, and developer experience at work. Check out the results and see what’s new for Stack Overflow users.

Captura de pantalla de platform.openai.com/tokenizer

OpenAI’s large language models (sometimes referred to as GPT’s) process text using tokens, which are common sequences of characters found in a set of text. The models learn to understand the statistical relationships between these tokens, and excel at producing the next token in a sequence of tokens.

You can think of tokens as the “letters” that make up the “words” and “sentences” that AI systems use to communicate.

A helpful rule of thumb is that one token generally corresponds to ~4 characters of text for common English text. This translates to roughly ¾ of a word (so 100 tokens ~= 75 words).

The process of breaking text down into tokens is called tokenization. This allows the AI to analyze and “digest” human language into a form it can understand. Tokens become the data used to train, improve, and run the AI systems.

Why Do Tokens Matter? There are two main reasons tokens are important to understand:

  1. Token Limits: All LLMs have a maximum number of tokens they can handle per input or response. This limit ranges from a few thousand for smaller models up to tens of thousands for large commercial ones. Exceeding the token limit can lead to errors, confusion, and poor quality responses from the AI.
  2. Cost: Companies like OpenAI, Anthropic, Alphabet, and Microsoft charge based on token usage when people access their AI services. Typically pricing is per 1000 tokens. So the more tokens fed into the system, the higher the cost to generate responses. Token limits help control expenses.

Strategies for Managing Tokens

Because tokens are central to how LLMs work, it’s important to learn strategies to make the most of them:

  • Keep prompts concise and focused on a single topic or question. Don’t overload the AI with tangents.
  • Break long conversations into shorter exchanges before hitting token limits.
  • Avoid huge blocks of text. Summarize previous parts of a chat before moving on.
  • Use a tokenizer tool to count tokens and estimate costs.
  • Experiment with different wording to express ideas in fewer tokens.
  • For complex requests, try a step-by-step approach vs. cramming everything into one prompt.

To somewhat expand on the earlier answers here, there are a number of details which are commonly overlooked.

  • Prefer subprocess.run() over subprocess.check_call() and friends over subprocess.call() over subprocess.Popen() over os.system() over os.popen()
  • Understand and probably use text=True, aka universal_newlines=True.
  • Understand the meaning of shell=True or shell=False and how it changes quoting and the availability of shell conveniences.
  • Understand differences between sh and Bash
  • Understand how a subprocess is separate from its parent, and generally cannot change the parent.
  • Avoid running the Python interpreter as a subprocess of Python.
Data Science at the Command Line

This thoroughly revised guide demonstrates how the flexibility of the command line can help you become a more efficient and productive data scientist. You’ll learn how to combine small yet powerful command-line tools to quickly obtain, scrub, explore, and model your data. To get you started, author Jeroen Janssens provides a Docker image packed with over 100 Unix power tools.

DK: ¿Tú qué piensas de la enseñanza religiosa en los colegios?JMP:

Uf. Hombre, yo es que soy muy tradicional, no en el sentido banal de la palabra, sino que yo me considero parte de una cadena, entonces yo creo que los seres humanos tienen que sentirse partícipes de una comunidad. Y lo que le da sentido a las comunidades en términos históricos es la religión, entonces yo creo que un español debe ser instruido en la religión católica.

DK: Un español musulmán, por ejemplo.JMP:

Un español…

DK: Un español puede ser musulmán, y protestante, y judío… musulmanes y judíos ha habido en España casi más años que católicos, ¿no?JMP:

Sí, pero todo nuestro arte, toda nuestra literatura… todo es católico.

DK: Entonces tú piensas que un español musulmán debería recibir clases de religión católica.JMP:

Sí, pero no en sentido catequético.

DK: Bueno, como se hace ahora en los colegios.JMP:

No, no, pero eso es una lección, un derecho de los padres a elegir la religión en la que desean que sus hijos sean formados.

DK: Ese derecho no existe en la religión musulmana, por ejemplo, mientras que para la católica sí es un derecho efectivo en todos los colegios.JMP:

Sí, pero bueno, también es una religión mayoritaria. Pero bueno, yo la pondría para todo el mundo.

DK: Obligatoria para todo el mundo.JMP:

Sí. Sí. Pero no en términos confesionales, en términos de instrucción, o sea, que la gente sepa qué es la eucaristía, que sepa lo que es la virginidad de María…

DK: Historia de las religiones…JMP:

Pero bueno, es que no es lo mismo.

DK: ¿De verdad crees en serio que está bien que le expliquen al hijo de un musulmán español lo que es la virginidad de la Virgen, la eucaristía y todo eso?JMP:

Sí, porque ese niño podrá leerse un auto sacramental de Calderón de la Barca y entenderlo. O podrá leerse un soneto de Lope de Vega y entenderlo. Es una forma de hacerlo partícipe de una tradición cultural, de una tradición artística, de una tradición… Yo creo que sí. Pero en esto no veamos un deseo de imponer religión o una determinada religión a la gente, no, es deseo de hacerla partícipe de nuestra historia.

A hedge fund is an investment fund where capital from various institutional and individual investors is combined and put toward a range of assets, including derivatives, stocks, bonds, commodities and foreign currencies, with the aim of optimizing returns.

Hedge funds, in general, operate as limited partnerships, professionally managed by fund managers who pool money from investors. However, participation in hedge funds, including those dealing with cryptocurrencies, is typically limited to high-net-worth individuals who can bear higher management fees and associated risks.

Crypto hedge funds generate revenue through an annual management fee, typically ranging from 1% to 4% of the invested amount. In addition, investors may also be obligated to pay a percentage of earned profits as performance fees to the managing team.

Crypto hedge funds employ a combination of systematic and discretionary investment strategies to effectively navigate the crypto landscape. The systematic approach relies on computer transaction processing models, offering a structured framework, reducing emotional influences and providing consistency. However, the risk lies in the potential vulnerability of these algorithms to unforeseen market conditions.

L’équipe des Imaginations Fertiles vous partage sa boîte à outils !
Retrouvez ici des documents vierges & disponibles pour vous aider dans le développement de votre projet.

Vous montez un tiers-lieu ? Vous questionnez vos usagers ? Vous animez des temps d’intelligence collective ? Vous souhaitez découvrir le design de service ?

L’équipe des Imaginations Fertiles peut vous accompagner dans vos projets, n’hésitez pas à nous faire part de vos besoins !

Outils et ressources pour les tiers-lieux qui développent une offre de formation professionnelle

PiNG est une structure aux mutliples facettes. À la fois association d’éducation populaire ressource sur les cultures numériques à l’échelle régionale et nationale; animatrice de deux tiers-lieux à Nantes (l’atelier partagé du Breil et le fablab Plateforme C), et organisme de formation, depuis plusieurs années.
C’est au croisement de ces facettes que cet article ressource va se concentrer, dans la perspective de fournir aux tiers-lieux en Pays de la Loire et à l’échelle nationale, un retour d’expérience orienté « opérationnel » sur des outils et des astuces permettant de développer une offre de formation ayant vocation à s’inscrire en conformité des exigences du référentiel national qualité en matière de formation professionnelle. En bref, si le mot « qualiopi » vous est familier, vous êtes au bon endroit pour glaner quelques ressources contexualisées avec une activité de tiers-lieu!

Escena de Gety Back

The Beatles: Get Back is a documentary television series directed and produced by Peter Jackson. It covers the making of the Beatles’ 1970 album Let It Be (which had the working title of Get Back) and draws largely from unused footage and audio material originally captured for and recycled original footage from the 1970 documentary of the album by Michael Lindsay-Hogg. The docuseries has a total runtime of nearly eight hours, consisting of three episodes, each of duration between two and three hours covering about one week each, together covering 21 days of studio time.

An oxygen bar is an establishment, or part of one, that sells oxygen for recreational use.

Oxygen bar guests pay about one U.S. dollar per minute to inhale a percentage of oxygen greater than the normal atmospheric content of 20.9% oxygen.

It has been claimed by alternative medicine that the human body is oxygen-deprived, and that oxygen will remove « toxins » and even cure cancer.

The medical profession warns that individuals with respiratory diseases such as asthma and emphysema should not inhale too much oxygen.[5] Higher than normal oxygen partial pressure can also indirectly cause carbon dioxide narcosis in patients with chronic obstructive pulmonary disease (COPD).

Escena de Solo, a Star Wars Story

George Lucas began developing a Han Solo prequel in 2012 and commissioned Lawrence Kasdan to write the screenplay. After Lucas sold Lucasfilm to The Walt Disney Company in 2012, Kasdan was hired to write Star Wars: The Force Awakens (2015), leaving his son Jonathan to complete the Solo script. Principal photography began in January 2017 at Pinewood Studios, with directors Phil Lord and Christopher Miller. Both were fired in June 2017 following creative differences with Lucasfilm, and Howard was hired as their replacement. Solo is one of the most expensive films ever made, with a budget of at least $275 million.

I love the WordPress Rest API and switching more and more from theme development to a headless WP approach, with an nice front-end framework. Right now I’m favoring Nuxt.js, which is build on Vue.js (check out wuxt, my very own dockerized nuxt/wp development environment).

For using WPs full strength with the Rest API I’ve collected/build a useful snippet library with WordPress Rest API extensions. I’ll try to maintain the following list as development goes on. All of the following extensions can be embedded in the functions.php file. If you wondering about the wuxt_ prefix, I’ve got the code from my Wuxt project and the prefix is as good as anyone.

Detecting the Safari browser: The user-agent of the Safari browser is “Safari”. This value is passed to indexOf() method to detect this value in the user-agent string. One additional check is required in the case of the Safari browser as the user-agent of the Chrome browser also includes the Safari browser’s user-agent. If both the user-agents of Chrome and Safari are in the user-agent, it means that the browser is Chrome, and hence the Safari browser value is discarded.

interact.js takes a slightly different approach compared to most drag and drop libraries. To give you as much control as possible, it tries to provide a simple, flexible API that gives you all the pointer event data you’ll need to move elements around.

The library doesn’t even do any moving at all! This is great because you decide exactly what feedback your users get. You can drag elements, draw on a canvas or (if you really need to) scroll the page.