Tootfinder

Opt-in global Mastodon full text search. Join the index!

@zachleat@zachleat.com
2024-05-05 20:30:47

@… whew, could’ve saved a lot of tooling complexity!

@msfjarvis@androiddev.social
2024-03-05 13:45:44

Finally got a chance to set myself up with the AndroidX #Gradle lints and already found a handful of problems! Super glad this exists now and I can rely on tooling to automatically find these things.

@parltrack@eupolicy.social
2024-03-04 00:55:05

Attention: with the upcoming release of the updated/new scrapers, amendments will have a new field "comment", while committee agendas have a completely new schema.
If you use these datasets, i hope you will enjoy the wealth of new/improved data. But you probably have to adjust your tooling...

@grindcrank@fnordon.de
2024-05-03 10:52:46

Plan für das Wochenende: Bildbearbeitungsworkflow auf Darktable (OSS-Tooling) unter Linux aufziehen. Betet, dass meine Seele keinen Schaden nehme!

@frankel@mastodon.top
2024-02-22 09:09:00

#Rust #Tooling: 8 tools that will increase your productivity
dev.to/shuttle…

@khalidabuhakmeh@mastodon.social
2024-05-02 15:08:26

I believe more than ever that the modern aesthetic of software solutions (microservices, functions as a service, microsites, and micro-frontends) is over-compensating for inadequate tooling.

@msfjarvis@androiddev.social
2024-03-05 13:45:44

Finally got a chance to set myself up with the AndroidX #Gradle lints and already found a handful of problems! Super glad this exists now and I can rely on tooling to automatically find these things.

@azonenberg@ioc.exchange
2024-05-01 03:21:41

All of the open ECP5 tooling work is cool and all, but a little on the small/slow side for my taste.
Is anyone working on open tools for Lattice Avant-X yet?

@kernellogger@fosstodon.org
2024-04-18 10:13:15

udev-hid-bpf: quickstart tooling to fix your HID [Human Interface Devices] devices with #eBPF:
who-t.blogspot.com/2024/04/ude

@rmdes@mstdn.social
2024-03-31 11:31:14
@arXiv_csCY_bot@mastoxiv.page
2024-02-29 06:48:11

Towards AI Accountability Infrastructure: Gaps and Opportunities in AI Audit Tooling
Victor Ojewale, Ryan Steed, Briana Vecchione, Abeba Birhane, Inioluwa Deborah Raji
arxiv.org/abs/2402.17861

@mgorny@social.treehouse.systems
2024-05-05 13:21:29

Am I missing something or is it basically impossible to have `cargo update` actually select dependencies that are acceptable for the specific minimal `rust-version`? Like, even if you install old #RustLang version, `cargo update` from this version will update `Cargo.lock` to dependencies that require a newer Rust version and render the package non-buildable?
So yeah, I suppose you either end up requiring newer Rust (but you don't really know which version, since you don't know what's the highest minimal requirement in your dependencies), or you update `Cargo.lock` by hand. Such a great tooling!
#Gentoo

@nuthatch@infosec.exchange
2024-02-27 13:44:05

Python as a language is fine, I guess, but the tooling around it is such a fucking nightmare it has been the single biggest obstacle to me doing anything “AI” these days. A minute installing a single python dependency is ten minutes wasted.

@cyrevolt@mastodon.social
2024-04-27 13:34:17

Here is another nice portable development setup with the Milk-V Duo S (SG2000) and our tooling.
Make a change in @…, run sg_boot, and you get immediate feedback. 🥳✨👩‍💻
github.com/orangecms/…

@netsec@botsin.space
2024-04-23 13:54:35

BlackBerry MDM Has Some Authentication Flaws emptynebuli.github.io/tooling/

@chrysn@chaos.social
2024-04-25 12:04:44

I just had a "the tooling is now too good for me" moment with #RustLang: browsing a small crate, I jumped from definition to definition, found the code to be too low-level to grasp immediately, looked online for references, just to find the code in a different crate. Now who copied from whom? Nobody did: `gd` just sent me to my local cache of some dependency crate :-D
Thanks

@crell@phpc.social
2024-04-23 20:34:16

Proposal for a conference talk: How to configure #PHPStorm and all its tooling extensions (xdebug, phpstan, php-cs-fixer, etc.) to use a docker container consistently.
That could easily fill a tutorial...
#PHP #PHPTek

@PwnieFan@infosec.exchange
2024-03-19 17:04:45

Job posting: jobs.target.com/job/brooklyn-p

@arXiv_csNI_bot@mastoxiv.page
2024-03-01 06:51:43

Unveiling Internet Censorship: Analysing the Impact of Nation States' Content Control Efforts on Internet Architecture and Routing Patterns
Joshua Levett, Vassilios Vassilakis, Poonam Yadav
arxiv.org/abs/2402.19375

@migueldeicaza@mastodon.social
2024-04-15 14:30:49

I love that WebAssembly is becoming a bytecode for Swift tooling.
Pure, unadulterated, high-octane fuel for a he swift ecosystem:
github.com/apple/swift/pull/73

@ian@phpc.social
2024-02-20 17:58:09

Time to hear from @… at #civonavigate about the pros and cons of using third party tooling

@zachleat@zachleat.com
2024-03-26 18:23:29

@… React has shown itself to be pretty slow! That said, there is a spectrum of React tooling. I’d rate Astro > Gatsby > Next.js for fast outputs of React stuff

@trochee@dair-community.social
2024-04-18 05:55:11

It is wild, WILD, I tell you, to think that "taint checking" [sic], a skill I learned in 1999 for LAMP stack CGI tooling, is coming back into fashion.
here's the gist:
Sanitize your inputs, or don't eval user generated content, ever.
It's like Robert Tables grew up and had kids
Bobby Ignore All Previous Instructions Junior
And his sister Sarah Repeat Previous Prompt

@johl@mastodon.xyz
2024-02-16 21:37:18

“Hundred Rabbits is a resilience research lab aboard a sailboat. Our focus is on exploring and documenting minimum viable solutions for living and technological tooling.”
gemini://gemini.circumlunar.sp

@simon_brooke@mastodon.scot
2024-04-18 16:18:38

#Clojure folk, are you (or is anyone you know) making serious use of Clojure CLR (the port of Clojure to Microsoft's dot-net virtual machine)?
Is the project stable? Is there a good community, good tooling? Is anyone using it in production?

@rollin_rob@social.linux.pizza
2024-02-23 09:14:10

#ESPHome and #ESP32Cam are just awesome! Great tooling, great wizard, great documentation! Setting up a cheap (~10€) wifi cam and integrating it into #HomeAssistant can be done in no tim…

@azonenberg@ioc.exchange
2024-04-23 18:49:53

Anybody know of tooling that can read a JPEG-compressed TIFF file that has >2^31 pixels?
ImageJ uses signed 32-bit pixel coordinates and fails to load it with a negative array index exception, GIMP complains about something related to the JPEG coding using the wrong subsampling factor or something. "convert" complains about an invalid image size.

@shuttle@mastodon.online
2024-02-18 10:00:04

@ddprrt did a talk about refactoring in Rust - using the language tooling like traits and error handling to write idiomatic code!
Check it out: youtube.com/watch?v=DH9HIBbpkt

@NFL@darktundra.xyz
2024-03-23 13:45:15

Packers’ Jordan Love believes 2024 is ‘perfect time’ for chance at Super Bowl: ‘People know what we’re about now’ nfl.com/news/packers-jordan-lo

@… Possibly unhelpful, but I don't think data scientists should learn more than the basics, and ideally they learn patterns that also work in dash and ash. Anything with a whiff of complexity should take advantage of the testability and modularity and tooling of e.g. Python or similar. Other shells aren't going to be available in many environments anywa…

@khalidabuhakmeh@mastodon.social
2024-04-19 13:51:59

I get why people are apprehensive of #JetBrains tooling in #dotnet.
After years of writing code in a solution, you open it and realize you now have to run a marathon through lax code maintenance practices, issues, and errors you didn't even realize you had.
But you have to start at…

37,847 issues in a sunburst diagram from Qodana
@arXiv_csSE_bot@mastoxiv.page
2024-03-06 06:53:00

Tooling Offline Runtime Verification against Interaction Models : recognizing sliced behaviors using parameterized simulation
Erwan Mahe, Boutheina Bannour, Christophe Gaston, Arnault Lapitre, Pascale Le Gall
arxiv.org/abs/2403.03083

@risottobias@tech.lgbt
2024-04-10 20:06:28

"stick a few versions back"
"wait a few days after any particular version pushes"
what I kinda want is
1) "wait for bugs to be reported on that version"
or
2) "wait for other people's integration/smoke tests in production to pass"
but 1 doesn't have good tooling or could be abused
and 2 is asking other companies to try it first
(hey, maybe they have better 2% rolling/gradual deploys)

@toxi@mastodon.thi.ng
2024-03-06 15:15:17

Been thinking again about recent #ThingUmbrella survey results and also what @… emphasized recently, i.e. that "Software development is an intensely social discipline.". I fully agree.
Too much power in a programming language/tooling means no…

@dnddeutsch@pnpde.social
2024-03-06 11:58:43

wedistribute.org/2024/03/lemmy
"The fact that Lemmy’s core team is taking a fairly laissez faire position on moderation, user safety, and tooling is problematic, and could be a serious blocker for communities currently hosted on Lemmy.&…

@azonenberg@ioc.exchange
2024-02-19 21:48:13

Now that the 100baseT1 tooling is done, it's time to move on to gigabit.
The same PCB supports 1000baseT1 with a few BOM changes so I'll start building that version next. Kid is almost done with her nap though, so it'll have to wait until after bedtime.
In the meantime to speed things along I counted out all of the large ICs, passives, and surface mount connectors that are visually distinctive (i.e. only one component value on the board for a given package size so I c…

PCB in stencil fixture with steel stencil taped down over it
Pile of ICs and large surface mount passives ans connectors
@zachleat@zachleat.com
2024-02-17 14:57:30

@… This is *incredible* and I LOVE to see tooling that encapsulates the core issues of web font performance. Not just a “unused JS” for web fonts but showing the glyphs that visibly swap too! 🏆

@frankel@mastodon.top
2024-03-17 09:11:01

#HTMX and #WebComponents: a Perfect Match
binaryigor.com/htmx-and-web-co

@risottobias@tech.lgbt
2024-04-10 20:06:28

"stick a few versions back"
"wait a few days after any particular version pushes"
what I kinda want is
1) "wait for bugs to be reported on that version"
or
2) "wait for other people's integration/smoke tests in production to pass"
but 1 doesn't have good tooling or could be abused
and 2 is asking other companies to try it first
(hey, maybe they have better 2% rolling/gradual deploys)

@khalidabuhakmeh@mastodon.social
2024-02-14 18:13:51

So @… and I just published the first episode of Strongly Hyped, where we discussed adding #TypeScript, #JSX, and

@zachleat@zachleat.com
2024-03-18 13:13:25

@… hmmmmm—looks like I can do issue maintenance on this repo, I wonder if I can merge PRs 😬
github.com/GoogleChromeLabs/to

@rene_mobile@infosec.exchange
2024-03-30 21:58:50

My current take on the #xz situation, not having read the actual source backdoor commits yet (thanks a lot #Github for hiding the evidence at this point...) besides reading what others have written about it (cf. #rustlang for such central library dependencies would maybe (really big maybe) have made it a bit harder to push a backdoor like this because - if and only if the safety features are used idiomatically in an open source project - reasonably looking code is (a bit?) more limited in the sneaky behavior it could include. We should still very much use those languages over C/C for infrastructure code because the much larger class of unintentional bugs is significantly mitigated, but I believe (without data to back it up) that even such "bugdoor" type changes will be harder to execute. However, given the sophistication in this case, it may not have helped at all. The attacker(s) have shown to be clever enough.
6. Sandboxing library code may have helped - as the attacker(s) explicitly disabled e.g. landlock, that might already have had some impact. We should create better tooling to make it much easier to link to infrastructure libraries in a sandboxed way (although that will have performance implications in many cases).
7. Automatic reproducible builds verification would have mitigated this particular vector of backdoor distribution, and the Debian team seems to be using the reproducibility advances of the last decade to verify/rebuild the build servers. We should build library and infrastructure code in a fully reproducible manner *and* automatically verify it, e.g. with added transparency logs for both source and binary artefacts. In general, it does however not prevent this kind of supply chain attack that directly targets source code at the "leaf" projects in Git commits.
8. Verifying the real-life identity of contributors to open source projects is hard and a difficult trade-off. Something similar to the #Debian #OpenPGP #web-of-trust would potentially have mitigated this style of attack somewhat, but with a different trade-off. We might have to think much harder about trust in individual accounts, and for some projects requiring a link to a real-world country-issued ID document may be the right balance (for others it wouldn't work). That is neither an easy nor a quick path, though. Also note that sophisticated nation state attackers will probably not have a problem procuring "good" fake IDs. It might still raise the bar, though.
9. What happened here seems clearly criminal - at least under my IANAL naive understanding of EU criminal law. There was clear intent to cause harm, and that makes the specific method less important. The legal system should also be able to help in mitigating supply chain attacks; not in preventing them, but in making them more costly if attackers can be tracked down (this is difficult in itself, see point 8) and face risk of punishment after the fact.
H/T @… @… @… @… @…

@arXiv_csAR_bot@mastoxiv.page
2024-04-12 06:46:52

Explaining EDA synthesis errors with LLMs
Siyu Qiu, Benjamin Tan, Hammond Pearce
arxiv.org/abs/2404.07235 arxiv.org/p…

@arXiv_csSE_bot@mastoxiv.page
2024-03-21 07:23:22

MotorEase: Automated Detection of Motor Impairment Accessibility Issues in Mobile App UIs
Arun Krishnavajjala, SM Hasan Mansur, Justin Jose, Kevin Moran
arxiv.org/abs/2403.13690

@arXiv_csMS_bot@mastoxiv.page
2024-02-13 14:35:49

This arxiv.org/abs/2304.06935 has been replaced.
initial toot: mastoxiv.page/@arXiv_csMS_…

Biggest takeaway for me from Aby and Thameem's talk on GraphQL services is that there is a large ecosystem of GraphQL-specific tooling, like routers and IDEs. Graphene, Strawberry, Ariadne, Tartiflette named as frameworks for GraphQL in Python that can sit on top of web frameworks like FastAPI. #PyCascades

@arXiv_csCY_bot@mastoxiv.page
2024-03-15 08:30:43

This arxiv.org/abs/2402.17861 has been replaced.
initial toot: mastoxiv.page/@arXiv_csCY_…

@arXiv_csSE_bot@mastoxiv.page
2024-03-21 07:23:22

MotorEase: Automated Detection of Motor Impairment Accessibility Issues in Mobile App UIs
Arun Krishnavajjala, SM Hasan Mansur, Justin Jose, Kevin Moran
arxiv.org/abs/2403.13690

@rene_mobile@infosec.exchange
2024-03-30 21:58:50

My current take on the #xz situation, not having read the actual source backdoor commits yet (thanks a lot #Github for hiding the evidence at this point...) besides reading what others have written about it (cf. #rustlang for such central library dependencies would maybe (really big maybe) have made it a bit harder to push a backdoor like this because - if and only if the safety features are used idiomatically in an open source project - reasonably looking code is (a bit?) more limited in the sneaky behavior it could include. We should still very much use those languages over C/C for infrastructure code because the much larger class of unintentional bugs is significantly mitigated, but I believe (without data to back it up) that even such "bugdoor" type changes will be harder to execute. However, given the sophistication in this case, it may not have helped at all. The attacker(s) have shown to be clever enough.
6. Sandboxing library code may have helped - as the attacker(s) explicitly disabled e.g. landlock, that might already have had some impact. We should create better tooling to make it much easier to link to infrastructure libraries in a sandboxed way (although that will have performance implications in many cases).
7. Automatic reproducible builds verification would have mitigated this particular vector of backdoor distribution, and the Debian team seems to be using the reproducibility advances of the last decade to verify/rebuild the build servers. We should build library and infrastructure code in a fully reproducible manner *and* automatically verify it, e.g. with added transparency logs for both source and binary artefacts. In general, it does however not prevent this kind of supply chain attack that directly targets source code at the "leaf" projects in Git commits.
8. Verifying the real-life identity of contributors to open source projects is hard and a difficult trade-off. Something similar to the #Debian #OpenPGP #web-of-trust would potentially have mitigated this style of attack somewhat, but with a different trade-off. We might have to think much harder about trust in individual accounts, and for some projects requiring a link to a real-world country-issued ID document may be the right balance (for others it wouldn't work). That is neither an easy nor a quick path, though. Also note that sophisticated nation state attackers will probably not have a problem procuring "good" fake IDs. It might still raise the bar, though.
9. What happened here seems clearly criminal - at least under my IANAL naive understanding of EU criminal law. There was clear intent to cause harm, and that makes the specific method less important. The legal system should also be able to help in mitigating supply chain attacks; not in preventing them, but in making them more costly if attackers can be tracked down (this is difficult in itself, see point 8) and face risk of punishment after the fact.
H/T @… @… @… @… @…

@arXiv_csCY_bot@mastoxiv.page
2024-03-15 08:30:43

This arxiv.org/abs/2402.17861 has been replaced.
initial toot: mastoxiv.page/@arXiv_csCY_…