CLI Club: Command-line Interface Tools & Alternativeshttps://cli.club/
observe and manage your applications in the wild. K9s continually watches Kubernetes for changes and offers subsequent commands to interact with your observed resources. nb: A com
A collection of the best CLI
Solene'%https://dataswamp.org/~solene/index-full.html
apps, running applications in background when a profile is not used, using the SIM...). This is really effective for privacy or security reasons (or both), you can have a differen
Command Line Interface Guidelineshttps://clig.dev/
than with graphical applications. Today, even though many CLI programs are used primarily (or even exclusively) by humans, a lot of their interaction design still carries the bagg
An open-source guide to help you write better command-line programs, taking traditional UNIX principles and updating them for the modern day.
Electt: Running Auditable and Verifiable Elections in Untrusted Environments - Kirill's journalhttps://kirill.korins.ky/articles/electt-running-auditable-and-verifiable-elections-in-untrusted-environments/
Counters and Applications to Electronic Voting. Springer Berlin Heidelberg, May 2001. DOI: 10.1007/3-540-44987-6_6 . ↩︎ Efficient multiplicative homomorphic e-v
We present a system for running auditable and verifiable elections in untrusted environments. Votes are anonymous since the order of candidates on a ballot sheet is random. Tellers
Draft-leach-cifs-v1-spec-02http://www.ubiqx.org/cifs/rfc-draft/draft-leach-cifs-v1-spec-02.html
access to files. Applications that lock files can not be improperly interfered with by applications that do not; once a file or record is locked, non-locking applications are deni
The Mailbag LG #115https://linuxgazette.net/115/lg_mail.html
involved higher-level applications such as credit card payment and inventory management. The 2038 bug, on the other hand, affects the basic time-keeping function. "I would guess t
Find more...