I keep searching for the most efficient and best way to take notes.
I have been searching for it for many years and I have not yet found my ultimate tool, but I have tried many different solutions.
For some, taking notes in a laptop works well. I have never gotten comfortable doing that.
I love the flexibility of a pen, I can write, draw, doodle, highlight, quickly and easily.
So my search mostly includes various ways of digitizing notes taken with a pen. (even though my penmanship is horrible and I dont think a computer program will ever be able to convert it to text)
I love working with the command line. Seriously, I think there’s hardly any more productive and more versatile tool for a software developer than the terminal. Maybe it’s the hacker/wizard/neckbeard kind of feeling I get when using a terminal, I don’t know.
No matter how much time and effort we spend on application security, it is always less. But simple workflows for things like secret management, key rotation and password expiration go a long way in making our applications and infrastructure resilient against the obvious attack vectors.
This post is contributed by Massimo Re Ferre – Principal Developer Advocate, AWS Container Services. Cloud security at AWS is the highest priority and the work that the Containers team is doing is a testament to that.
We’re going to take a quick look at storing secrets accessed by our serverless Lambda functions in AWS using the recently (April ’18) announced AWS Secrets Manager. The Secrets Manager main aim is to help you store, distribute and rotate credentials securely. Secrets come at $0.
An important aspect of running ASP.NET Core apps in the cloud is how you secure the secrets your app requires, things like connection strings and API keys.
Amazon ECS enables you to inject sensitive data into your containers by storing your sensitive data in AWS Secrets Manager secrets and then referencing them in your container definition. For more information, see Specifying Sensitive Data.
ConsoleGUI is a simple .NET framework for creating console-based GUI applications. It provides most essential layout management utilities as well as a set of basic controls.
Short version: Tether is the internal accounting system for the largest fraud since Madoff. Read on for the long version.
The repeating patterns in a snowflake are a classic example of beautiful, geometric fractals. Now MIT scientists have discovered fractal-like patterns in the magnetic configurations of a quantum material for the first time.
In the “stone age” days of the Internet, sharing information between services was easy. You simply gave your username and password for one service to another so they could login to your account and grab whatever information they wanted!