wiby  
Settings



CLI Club: Command-line Interface Tools & Alternatives

https://cli.club/

observe and manage your applications in the wild. K9s continually watches Kubernetes for changes and offers subsequent commands to interact with your observed resources. nb: A com
A collection of the best CLI

Solene'%

https://dataswamp.org/~solene/index-full.html

apps, running applications in background when a profile is not used, using the SIM...). This is really effective for privacy or security reasons (or both), you can have a differen

Command Line Interface Guidelines

https://clig.dev/

than with graphical applications. Today, even though many CLI programs are used primarily (or even exclusively) by humans, a lot of their interaction design still carries the bagg
An open-source guide to help you write better command-line programs, taking traditional UNIX principles and updating them for the modern day.

Electt: Running Auditable and Verifiable Elections in Untrusted Environments - Kirill's journal

https://kirill.korins.ky/articles/electt-running-auditable-and-verifiable-elections-in-untrusted-environments/

Counters and Applications to Electronic Voting. Springer Berlin Heidelberg, May 2001. DOI: 10.1007/3-540-44987-6_6 .  ↩︎ Efficient multiplicative homomorphic e-v
We present a system for running auditable and verifiable elections in untrusted environments. Votes are anonymous since the order of candidates on a ballot sheet is random. Tellers

Draft-leach-cifs-v1-spec-02

http://www.ubiqx.org/cifs/rfc-draft/draft-leach-cifs-v1-spec-02.html

access to files. Applications that lock files can not be improperly interfered with by applications that do not; once a file or record is locked, non-locking applications are deni

The Mailbag LG #115

https://linuxgazette.net/115/lg_mail.html

involved higher-level applications such as credit card payment and inventory management. The 2038 bug, on the other hand, affects the basic time-keeping function. "I would guess t


Find more...