I would love there to be a bot just auditing every package.json on github and sending PRs to remove useless packages from their dependencies.
I really hate getting PR spam from bots like that.
Interesting, do you get a lot of them? Do you dislike them because they are wrong?
That would be easy if there was a list of useless dependencies. Does that exist in any form?
Not quite what was asked for, but there is this tool which checks for unused dependencies. https://github.com/depcheck/depcheck
My general advice is just practice. I’ve never been great, but I try and write down key points and thoughts. I usually can’t write fast enough to get what people said verbatim, but I can get important talking points. This can then be used to jog your memory.
I usually write down:
Hope that helps.
Golang and/or React are my current suggestions for things to learn related to web dev. If you’re interested in mobile, Swift 3 is pretty sweet!
Have people used this and/or taskwarrior? I’ve considered using it, but never tried.
I used taskwarrior in the past at previous $work to help me grok the amount of management bullshit I had to track while being team leader. It has built-in burn down charts and a ton of features that come in handy while remaining a normal CLI app. It’s a similar feeling you have when you start using ‘ledger’. Suddenly you have a pretty versatile, flexible tool that is there to just this specific task without a fancy GUI that slows you down.
Taskwarrior and org-mode are pretty much at the top of my todo management utilities.
Not many are using this yet, partly because it has not been released, and partly because no one knows about it. It should be released around the end of the month, at which point it should be stable enough to recommend. But not yet.
Disclaimer: I wrote it.
Also of interest:
$ curl -sv https://lobste.rs/s/jt34ml/what_kind_hardware_cloud_does_lobste_rs > /dev/null
* Trying 220.127.116.11...
* Connected to lobste.rs (18.104.22.168) port 443 (#0)
* TLS 1.2 connection using TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
* Server certificate: lobste.rs
* Server certificate: Let's Encrypt Authority X3
* Server certificate: DST Root CA X3
> GET /s/jt34ml/what_kind_hardware_cloud_does_lobste_rs HTTP/1.1
> Host: lobste.rs
> User-Agent: curl/7.43.0
> Accept: */*
< HTTP/1.1 200 OK
< Date: Tue, 02 Aug 2016 03:26:42 GMT
< Content-Type: text/html; charset=utf-8
lobste.rs cert is from letsencrypt
They are only running on a single IP (22.214.171.124), which is in a /24 owned by M5 Computer Security according to whois.
M5 Computer Security M5-SECURITY-NETBLK-3 (NET-207-158-15-0-1) 126.96.36.199 - 188.8.131.52
update: oh missed that @apg pointed out the whois stuff already. womp womp.
Thanks for reminding me about this. I tend to forget about this joyous day. Your post forced me to reflect on all of the great sysadmins that inspired me to get where I am today, so thank you.