Explore >> Select a destination


You are here

www.philipzucker.com
| | lukesingham.com
20.9 parsecs away

Travel
| | Grokking Algorithms is a beautifully formatted book that explains complex material simply using pictures, analogies and high level practical explanations. This post is a review and summary of the Grokking Algorithms book.
| | bayesianneuron.com
22.2 parsecs away

Travel
| |
| | coderik.nl
23.4 parsecs away

Travel
| | Stop Pydantic leaking into your domain layer. Use lightweight mappers or dacite to convert Pydantic models into pure old python dataclasses and keep your domain layer free of third-party libraries.
| | dustymabe.com
128.4 parsecs away

Travel
| It is common practice among Linux users to exchange ssh keys between machines so that you can ssh between them without having to authenticate. The manual process for doing this involves taking the public key of the local host (~/.ssh/id_rsa.pub or ~/.ssh/id_dsa.pub) and appending it to the ~/.ssh/authorized_keys file of the remote host you wish to log in without a password. This process is simple, but requires a few different steps.