The best Hacker News stories from Show from the past day
Latest posts:
Show HN: Dashboards as Code – We make dashboards more programmable
As engineers building a BI tool, we thought, why not treat analytics like software development?<p>We believe dashboards should be as-code because this allows you to:<p>* Treat dashboards as programmable objects and build reusable components/functions.<p>* Dynamically generate charts or dashboards.<p>* Version control every dashboard in a Git repository.<p>* Automate and integrate your dashboards with your workflow.<p>So, we built one! It’s still a work in progress, but you can tinker with it here: https://playground.holistics.io/play<p>Feedback is very welcome and appreciated.
Show HN: An interactive creative coding project in p5.js
(space = reset) Fluid mechanics is an extremely interesting topic and I have been creative coding for a couple of months now. Therefore I started working on flow fields in processing. It had so much fun playing around with the different parameters in this project, I decided to rewrite in p5.js an added a control panel. You can change most of the parameters (within some constraints I thought to be reasonable), randomize the values and export and import settings. Hopefully some coders here get inspired and also join the great creative coding community.
Show HN: Shadow IT Scan – Uncover SaaS Apps, Users and Risky OAuth Scopes
Hey HN,<p>TL;DR: We’ve launched a free version of our Shadow IT scanner to identify which SaaS apps are used in your company, who uses them, and if they have high-risk OAuth scopes.<p>Philip and I went through YC with AccessOwl in 2022. We started the company because, in our previous roles, we struggled to track all the SaaS apps, users, and granted OAuth scopes.
The Shadow IT scanner started as a small feature within AccessOwl, which manages SaaS vendors and user accounts centrally. But a standalone scanner would have made our lives so much easier in our previous roles. So, we thought, why not release it?<p>And here it is: a free, standalone Shadow IT scanner!<p>Hope you find it useful :) The Shadow IT scan helps with:<p>1. Offboarding: Employees often don’t report all the apps they sign up for, making it tough to track and secure these accounts when they leave, especially with the common SSO tax.<p>2. Security: OAuth scopes are quickly granted but rarely reviewed or removed, leading to organizations unknowingly spreading their data.<p>3. Compliance: Auditors need a list of SaaS vendors, which is hard to compile when employees sign up for tools independently.<p>Any surprises in your scan? What features would you like to see in the next version?
Looking forward to your feedback!<p>FAQ<p>What’s Shadow IT?
Unauthorized SaaS apps within an organization not centrally managed, posing security and compliance risks.<p>How does it work?
Our tool connects to your Google Workspace or M365 instance, identifies OAuth tokens granted, and maps them to known SaaS tools. Note: In this v1 version, it only detects apps using the “Sign in with Google/Microsoft” button.<p>Who is this for?
Typically IT and InfoSec teams, but in smaller companies, it may fall under the CTO.<p>Is it safe to use?
Yes, reading OAuth tokens is standard for SaaS management tools. Data extraction only occurs when you initiate a scan. AccessOwl is SOC 2 Type II audited and GDPR compliant.
Show HN: Shadow IT Scan – Uncover SaaS Apps, Users and Risky OAuth Scopes
Hey HN,<p>TL;DR: We’ve launched a free version of our Shadow IT scanner to identify which SaaS apps are used in your company, who uses them, and if they have high-risk OAuth scopes.<p>Philip and I went through YC with AccessOwl in 2022. We started the company because, in our previous roles, we struggled to track all the SaaS apps, users, and granted OAuth scopes.
The Shadow IT scanner started as a small feature within AccessOwl, which manages SaaS vendors and user accounts centrally. But a standalone scanner would have made our lives so much easier in our previous roles. So, we thought, why not release it?<p>And here it is: a free, standalone Shadow IT scanner!<p>Hope you find it useful :) The Shadow IT scan helps with:<p>1. Offboarding: Employees often don’t report all the apps they sign up for, making it tough to track and secure these accounts when they leave, especially with the common SSO tax.<p>2. Security: OAuth scopes are quickly granted but rarely reviewed or removed, leading to organizations unknowingly spreading their data.<p>3. Compliance: Auditors need a list of SaaS vendors, which is hard to compile when employees sign up for tools independently.<p>Any surprises in your scan? What features would you like to see in the next version?
Looking forward to your feedback!<p>FAQ<p>What’s Shadow IT?
Unauthorized SaaS apps within an organization not centrally managed, posing security and compliance risks.<p>How does it work?
Our tool connects to your Google Workspace or M365 instance, identifies OAuth tokens granted, and maps them to known SaaS tools. Note: In this v1 version, it only detects apps using the “Sign in with Google/Microsoft” button.<p>Who is this for?
Typically IT and InfoSec teams, but in smaller companies, it may fall under the CTO.<p>Is it safe to use?
Yes, reading OAuth tokens is standard for SaaS management tools. Data extraction only occurs when you initiate a scan. AccessOwl is SOC 2 Type II audited and GDPR compliant.
Show HN: Shadow IT Scan – Uncover SaaS Apps, Users and Risky OAuth Scopes
Hey HN,<p>TL;DR: We’ve launched a free version of our Shadow IT scanner to identify which SaaS apps are used in your company, who uses them, and if they have high-risk OAuth scopes.<p>Philip and I went through YC with AccessOwl in 2022. We started the company because, in our previous roles, we struggled to track all the SaaS apps, users, and granted OAuth scopes.
The Shadow IT scanner started as a small feature within AccessOwl, which manages SaaS vendors and user accounts centrally. But a standalone scanner would have made our lives so much easier in our previous roles. So, we thought, why not release it?<p>And here it is: a free, standalone Shadow IT scanner!<p>Hope you find it useful :) The Shadow IT scan helps with:<p>1. Offboarding: Employees often don’t report all the apps they sign up for, making it tough to track and secure these accounts when they leave, especially with the common SSO tax.<p>2. Security: OAuth scopes are quickly granted but rarely reviewed or removed, leading to organizations unknowingly spreading their data.<p>3. Compliance: Auditors need a list of SaaS vendors, which is hard to compile when employees sign up for tools independently.<p>Any surprises in your scan? What features would you like to see in the next version?
Looking forward to your feedback!<p>FAQ<p>What’s Shadow IT?
Unauthorized SaaS apps within an organization not centrally managed, posing security and compliance risks.<p>How does it work?
Our tool connects to your Google Workspace or M365 instance, identifies OAuth tokens granted, and maps them to known SaaS tools. Note: In this v1 version, it only detects apps using the “Sign in with Google/Microsoft” button.<p>Who is this for?
Typically IT and InfoSec teams, but in smaller companies, it may fall under the CTO.<p>Is it safe to use?
Yes, reading OAuth tokens is standard for SaaS management tools. Data extraction only occurs when you initiate a scan. AccessOwl is SOC 2 Type II audited and GDPR compliant.
Show HN: Shadow IT Scan – Uncover SaaS Apps, Users and Risky OAuth Scopes
Hey HN,<p>TL;DR: We’ve launched a free version of our Shadow IT scanner to identify which SaaS apps are used in your company, who uses them, and if they have high-risk OAuth scopes.<p>Philip and I went through YC with AccessOwl in 2022. We started the company because, in our previous roles, we struggled to track all the SaaS apps, users, and granted OAuth scopes.
The Shadow IT scanner started as a small feature within AccessOwl, which manages SaaS vendors and user accounts centrally. But a standalone scanner would have made our lives so much easier in our previous roles. So, we thought, why not release it?<p>And here it is: a free, standalone Shadow IT scanner!<p>Hope you find it useful :) The Shadow IT scan helps with:<p>1. Offboarding: Employees often don’t report all the apps they sign up for, making it tough to track and secure these accounts when they leave, especially with the common SSO tax.<p>2. Security: OAuth scopes are quickly granted but rarely reviewed or removed, leading to organizations unknowingly spreading their data.<p>3. Compliance: Auditors need a list of SaaS vendors, which is hard to compile when employees sign up for tools independently.<p>Any surprises in your scan? What features would you like to see in the next version?
Looking forward to your feedback!<p>FAQ<p>What’s Shadow IT?
Unauthorized SaaS apps within an organization not centrally managed, posing security and compliance risks.<p>How does it work?
Our tool connects to your Google Workspace or M365 instance, identifies OAuth tokens granted, and maps them to known SaaS tools. Note: In this v1 version, it only detects apps using the “Sign in with Google/Microsoft” button.<p>Who is this for?
Typically IT and InfoSec teams, but in smaller companies, it may fall under the CTO.<p>Is it safe to use?
Yes, reading OAuth tokens is standard for SaaS management tools. Data extraction only occurs when you initiate a scan. AccessOwl is SOC 2 Type II audited and GDPR compliant.
Show HN: Burrow is a globally distributed, serverless HTTP proxy
Show HN: Trayce – Network tab for Docker containers
Trayce (<a href="https://github.com/evanrolfe/trayce_gui">https://github.com/evanrolfe/trayce_gui</a>) is an open source desktop application which monitors HTTP(S) traffic to Docker containers on your machine. It uses EBPF to achieve zero-configuration sniffing of TLS-encrypted traffic.<p>As a backend developer I wanted something which was similar to Wireshark or the Chrome network tab, but which intercepted requests & responses to my containers for debugging in a local dev environment. Wireshark is a great tool but it seems more geared towards lower level networking tasks. When I'm developing APIs or microservices I dont care about packets, I'm only concerned with HTTP requests and their responses. I also didn't want to have to configure a pre-shared master key to intercept TLS, I wanted it to work out-of-the-box.<p>Trayce is in beta phase so feedback is very welcome, bug reports too. The frontend GUI is written in Python with the QT framework. The TrayceAgent which is what does the intercepting of traffic is written in Go and EBPF.
Show HN: Trayce – Network tab for Docker containers
Trayce (<a href="https://github.com/evanrolfe/trayce_gui">https://github.com/evanrolfe/trayce_gui</a>) is an open source desktop application which monitors HTTP(S) traffic to Docker containers on your machine. It uses EBPF to achieve zero-configuration sniffing of TLS-encrypted traffic.<p>As a backend developer I wanted something which was similar to Wireshark or the Chrome network tab, but which intercepted requests & responses to my containers for debugging in a local dev environment. Wireshark is a great tool but it seems more geared towards lower level networking tasks. When I'm developing APIs or microservices I dont care about packets, I'm only concerned with HTTP requests and their responses. I also didn't want to have to configure a pre-shared master key to intercept TLS, I wanted it to work out-of-the-box.<p>Trayce is in beta phase so feedback is very welcome, bug reports too. The frontend GUI is written in Python with the QT framework. The TrayceAgent which is what does the intercepting of traffic is written in Go and EBPF.
Show HN: Trayce – Network tab for Docker containers
Trayce (<a href="https://github.com/evanrolfe/trayce_gui">https://github.com/evanrolfe/trayce_gui</a>) is an open source desktop application which monitors HTTP(S) traffic to Docker containers on your machine. It uses EBPF to achieve zero-configuration sniffing of TLS-encrypted traffic.<p>As a backend developer I wanted something which was similar to Wireshark or the Chrome network tab, but which intercepted requests & responses to my containers for debugging in a local dev environment. Wireshark is a great tool but it seems more geared towards lower level networking tasks. When I'm developing APIs or microservices I dont care about packets, I'm only concerned with HTTP requests and their responses. I also didn't want to have to configure a pre-shared master key to intercept TLS, I wanted it to work out-of-the-box.<p>Trayce is in beta phase so feedback is very welcome, bug reports too. The frontend GUI is written in Python with the QT framework. The TrayceAgent which is what does the intercepting of traffic is written in Go and EBPF.
Show HN: Turn any website into a knowledge base for LLMs
I built this tool because I wanted a way to just take a bunch of URLs or domains, and query their content in RAG applications.<p>It takes away the pain of crawling, extracting content, chunking, vectorizing, and updating periodically.<p>I'm curious to see if it can be useful to others. I meant to launch this six months ago but life got in the way...
Show HN: Turn any website into a knowledge base for LLMs
I built this tool because I wanted a way to just take a bunch of URLs or domains, and query their content in RAG applications.<p>It takes away the pain of crawling, extracting content, chunking, vectorizing, and updating periodically.<p>I'm curious to see if it can be useful to others. I meant to launch this six months ago but life got in the way...
Show HN: Turn any website into a knowledge base for LLMs
I built this tool because I wanted a way to just take a bunch of URLs or domains, and query their content in RAG applications.<p>It takes away the pain of crawling, extracting content, chunking, vectorizing, and updating periodically.<p>I'm curious to see if it can be useful to others. I meant to launch this six months ago but life got in the way...
Show HN: Turn any website into a knowledge base for LLMs
I built this tool because I wanted a way to just take a bunch of URLs or domains, and query their content in RAG applications.<p>It takes away the pain of crawling, extracting content, chunking, vectorizing, and updating periodically.<p>I'm curious to see if it can be useful to others. I meant to launch this six months ago but life got in the way...
Show HN: Stempad – Fast Online Scientific Writing
I'm building an online text-editor editor to write and save scientific documents fast. Here's a video of how it works: <a href="https://youtu.be/Hyk8CvCdEWE" rel="nofollow">https://youtu.be/Hyk8CvCdEWE</a><p>As an engineering student, I hated that handwriting was the only viable way to do fast or impromptu scientific writing. It would be the only way to take quick notes in class or in a lab, write an assignment, or create a presentation. Here's a few things I witnessed in academia:<p>* Unsuitable editors: Students attempt to resort to text editors unoptimized for science, such as Notion or Word, to take notes and write assignments.<p>* Slow or expensive software: Students, teachers, and researchers using high-friction and high-cost tools for writing<p>* Messy class notes: Professors upload pictures of hastily handwritten class notes as supplementary material<p>The list could go on. I believe that the ability to quickly document scientific ideas with a keyboard would be a huge QOL improvement for anyone learning or doing science.<p>I recently launched the ability to export Stempad documents to LaTex. I tested it by rewriting part of a paper I found online (Metabolic scaling in small life forms by Marc E. Ritchie & Christopher P. Kempes) and exporting it. You can try the editor and export yourself using the post url. The export button is on the top right of the page. In case you want to see the result directly, this was it: <a href="https://www.overleaf.com/read/zjccqbjdyhtc#6e146c" rel="nofollow">https://www.overleaf.com/read/zjccqbjdyhtc#6e146c</a><p>Feedback is really appreciated! If anyone thinks they might find Stempad useful, let me know and I'd love to get in touch.
Show HN: Stempad – Fast Online Scientific Writing
I'm building an online text-editor editor to write and save scientific documents fast. Here's a video of how it works: <a href="https://youtu.be/Hyk8CvCdEWE" rel="nofollow">https://youtu.be/Hyk8CvCdEWE</a><p>As an engineering student, I hated that handwriting was the only viable way to do fast or impromptu scientific writing. It would be the only way to take quick notes in class or in a lab, write an assignment, or create a presentation. Here's a few things I witnessed in academia:<p>* Unsuitable editors: Students attempt to resort to text editors unoptimized for science, such as Notion or Word, to take notes and write assignments.<p>* Slow or expensive software: Students, teachers, and researchers using high-friction and high-cost tools for writing<p>* Messy class notes: Professors upload pictures of hastily handwritten class notes as supplementary material<p>The list could go on. I believe that the ability to quickly document scientific ideas with a keyboard would be a huge QOL improvement for anyone learning or doing science.<p>I recently launched the ability to export Stempad documents to LaTex. I tested it by rewriting part of a paper I found online (Metabolic scaling in small life forms by Marc E. Ritchie & Christopher P. Kempes) and exporting it. You can try the editor and export yourself using the post url. The export button is on the top right of the page. In case you want to see the result directly, this was it: <a href="https://www.overleaf.com/read/zjccqbjdyhtc#6e146c" rel="nofollow">https://www.overleaf.com/read/zjccqbjdyhtc#6e146c</a><p>Feedback is really appreciated! If anyone thinks they might find Stempad useful, let me know and I'd love to get in touch.
Show HN: Stempad – Fast Online Scientific Writing
I'm building an online text-editor editor to write and save scientific documents fast. Here's a video of how it works: <a href="https://youtu.be/Hyk8CvCdEWE" rel="nofollow">https://youtu.be/Hyk8CvCdEWE</a><p>As an engineering student, I hated that handwriting was the only viable way to do fast or impromptu scientific writing. It would be the only way to take quick notes in class or in a lab, write an assignment, or create a presentation. Here's a few things I witnessed in academia:<p>* Unsuitable editors: Students attempt to resort to text editors unoptimized for science, such as Notion or Word, to take notes and write assignments.<p>* Slow or expensive software: Students, teachers, and researchers using high-friction and high-cost tools for writing<p>* Messy class notes: Professors upload pictures of hastily handwritten class notes as supplementary material<p>The list could go on. I believe that the ability to quickly document scientific ideas with a keyboard would be a huge QOL improvement for anyone learning or doing science.<p>I recently launched the ability to export Stempad documents to LaTex. I tested it by rewriting part of a paper I found online (Metabolic scaling in small life forms by Marc E. Ritchie & Christopher P. Kempes) and exporting it. You can try the editor and export yourself using the post url. The export button is on the top right of the page. In case you want to see the result directly, this was it: <a href="https://www.overleaf.com/read/zjccqbjdyhtc#6e146c" rel="nofollow">https://www.overleaf.com/read/zjccqbjdyhtc#6e146c</a><p>Feedback is really appreciated! If anyone thinks they might find Stempad useful, let me know and I'd love to get in touch.
Show HN: A video editing SDK that runs in the browser
Hello HN,<p>Video content is more popular than ever, but the toolkit for creating such content is a bit behind. You usually have to rely on a server for rendering whenever you want to create a video editing project in the browser. This means uploading content to a server, coding complex filters and effects, and more.<p>My friend and I spent a year developing an SDK that handles all these complexities and offers an easy-to-use interface for developers. The SDK works entirely in the browser, manages memory efficiently so it can run even on a 7-year-old Android device, supports GLSL effects and transitions, handles captions, and much more.<p>We also created a custom video editor UI interface using the SDK to showcase its speed and flexibility. You can see the video editor embedded on our landing page: <a href="https://rendley.com" rel="nofollow">https://rendley.com</a>.<p>As for the tech stack, the SDK was built using TypeScript, Pixi.js, C++, FFmpeg WASM, and WebCodecs. The UI interface was created using Stencil.js and MobX.<p>The SDK is called Rendley SDK and it is live on npm: <a href="https://www.npmjs.com/package/@rendley/sdk" rel="nofollow">https://www.npmjs.com/package/@rendley/sdk</a><p>To get started, follow this guide: <a href="https://docs.rendley.com/installation" rel="nofollow">https://docs.rendley.com/installation</a><p>If you want to embed the pre-made interface, follow this guide, it’s literally a few lines of code: <a href="https://docs.rendley.com/video-editor" rel="nofollow">https://docs.rendley.com/video-editor</a><p>If you have any questions about the product or any feedback, feel free to write them below, and I’ll be more than happy to answer them.
Show HN: A video editing SDK that runs in the browser
Hello HN,<p>Video content is more popular than ever, but the toolkit for creating such content is a bit behind. You usually have to rely on a server for rendering whenever you want to create a video editing project in the browser. This means uploading content to a server, coding complex filters and effects, and more.<p>My friend and I spent a year developing an SDK that handles all these complexities and offers an easy-to-use interface for developers. The SDK works entirely in the browser, manages memory efficiently so it can run even on a 7-year-old Android device, supports GLSL effects and transitions, handles captions, and much more.<p>We also created a custom video editor UI interface using the SDK to showcase its speed and flexibility. You can see the video editor embedded on our landing page: <a href="https://rendley.com" rel="nofollow">https://rendley.com</a>.<p>As for the tech stack, the SDK was built using TypeScript, Pixi.js, C++, FFmpeg WASM, and WebCodecs. The UI interface was created using Stencil.js and MobX.<p>The SDK is called Rendley SDK and it is live on npm: <a href="https://www.npmjs.com/package/@rendley/sdk" rel="nofollow">https://www.npmjs.com/package/@rendley/sdk</a><p>To get started, follow this guide: <a href="https://docs.rendley.com/installation" rel="nofollow">https://docs.rendley.com/installation</a><p>If you want to embed the pre-made interface, follow this guide, it’s literally a few lines of code: <a href="https://docs.rendley.com/video-editor" rel="nofollow">https://docs.rendley.com/video-editor</a><p>If you have any questions about the product or any feedback, feel free to write them below, and I’ll be more than happy to answer them.
Show HN: A video editing SDK that runs in the browser
Hello HN,<p>Video content is more popular than ever, but the toolkit for creating such content is a bit behind. You usually have to rely on a server for rendering whenever you want to create a video editing project in the browser. This means uploading content to a server, coding complex filters and effects, and more.<p>My friend and I spent a year developing an SDK that handles all these complexities and offers an easy-to-use interface for developers. The SDK works entirely in the browser, manages memory efficiently so it can run even on a 7-year-old Android device, supports GLSL effects and transitions, handles captions, and much more.<p>We also created a custom video editor UI interface using the SDK to showcase its speed and flexibility. You can see the video editor embedded on our landing page: <a href="https://rendley.com" rel="nofollow">https://rendley.com</a>.<p>As for the tech stack, the SDK was built using TypeScript, Pixi.js, C++, FFmpeg WASM, and WebCodecs. The UI interface was created using Stencil.js and MobX.<p>The SDK is called Rendley SDK and it is live on npm: <a href="https://www.npmjs.com/package/@rendley/sdk" rel="nofollow">https://www.npmjs.com/package/@rendley/sdk</a><p>To get started, follow this guide: <a href="https://docs.rendley.com/installation" rel="nofollow">https://docs.rendley.com/installation</a><p>If you want to embed the pre-made interface, follow this guide, it’s literally a few lines of code: <a href="https://docs.rendley.com/video-editor" rel="nofollow">https://docs.rendley.com/video-editor</a><p>If you have any questions about the product or any feedback, feel free to write them below, and I’ll be more than happy to answer them.