Tutorial

6 posts with this tag

In recent years, the web development eco-system have made a massive breakthrough. Thanks to Vite, the fast and optimized web bundler, now we can scaffold and optimize all kinds of web project. From full-fledged web applications, to simple marketing landing pages.
Read more...
One simple use-case where systemd comes in handy, is when I want to run certain services or programs at system startup. Every time I fire up my machine, I need to remind myself to go and run certain programs manually. This has become tedious over time, and I always seem to forget to do so. An easy and permanent fix would be to create a systemd service to fire up my programs whenever my machine starts.
Read more...
In this post, we’ll tackle one of the most famous Regression problems in Machine Learning. Namely, The California House Price Prediction problem. It is the “Hello, World!” of Regression Analysis, and by the end you should have a comprehensive understanding of the common steps needed to solve Regression problems.
Read more...
The Dot
Sep , 2024
Vim is optimized for repetition. Its efficiency stems from the way it tracks our most recent actions. We can always replay the last change with a single keystroke. Powerful as this sounds, it’s useless unless we learn to craft our actions so that they perform a useful unit of work when replayed. Mastering this concept is the key to becoming effective in Vim.
Read more...
Vim Normal Mode
Sep , 2024
Normal mode is Vim’s natural resting state. Other text editors spend most of their time in something that resembles Insert mode. For those new to Vim, Normal mode might seem like a strange default. But experienced Vim users have difficulty imagining it any other way.
Read more...
Creating and maintaining your own encryption keys is a must-know skill for anyone who’s serious about their security and privacy. If you have sensitive files on your harddrive, or surf the Internet on a daily basis then its a no-brainer. You don’t have to know the intricate math details of how RSA or Elliptical Curve algorithms work, but at least you should be familiar with how good and effective they are against potential attackers.
Read more...