Found 32147 bookmarks
Newest
Google I/O 2009 - The Myth of the Genius Programmer
Google I/O 2009 - The Myth of the Genius Programmer
Google I/O 2009 - The Myth of the Genius Programmer Brian Fitzpatrick, Ben Collins-Sussman A pervasive elitism hovers in the background of collaborative software development: everyone secretly wants to be seen as a genius. In this talk, we discuss how to avoid this trap and gracefully exchange personal ego for personal growth and super-charged collaboration. We'll also examine how software tools affect social behaviors, and how to successfully manage the growth of new ideas. For presentation slides and all I/O sessions, please go to: code.google.com/events/io/sessions.html
·youtube.com·
Google I/O 2009 - The Myth of the Genius Programmer
#NoEstimates (Allen Holub)
#NoEstimates (Allen Holub)
This keynote presents my (and many other's) thinking about #NoEstimates. It argues that estimation is a bad thing, particularly in the Agile world, and presents ways to plan that don't involve estimation.
·youtube.com·
#NoEstimates (Allen Holub)
Simple Made Easy
Simple Made Easy
Rich Hickey emphasizes simplicity’s virtues over easiness’, showing that while many choose easiness they may end up with complexity, and the better way is to choose easiness along the simplicity path.
·infoq.com·
Simple Made Easy
Category Theory in Life - Eugenia Cheng
Category Theory in Life - Eugenia Cheng
This presentation was the opening keynote of Lambda World 2017 by Dr. Eugenia Cheng. Follow: -https://www.twitter.com/47deg -https://www.twitter.com/lambda_world Visit: -https://www.47deg.com/events for more details. ___ Category theory can be thought of as being 'very abstract algebra'. It is thought of as 'too abstract' by some people, and as 'abstract nonsense' by some others. In this talk, I will show that while it is abstract, it is far from being nonsense. I will argue that the abstraction has a purpose and that broad applicability is one of the powerful consequences. To demonstrate this, I will show how I apply concepts of category theory to important questions of life such as prejudice, privilege, blame and responsibility. I will introduce the category theory concepts from scratch so no prior knowledge is needed. These concepts will include objects and morphisms, isomorphisms and universal properties.
·youtube.com·
Category Theory in Life - Eugenia Cheng
Unite Europe 2016 - ECS architecture with Unity by example
Unite Europe 2016 - ECS architecture with Unity by example
Simon Schmid (Wooga) and Maxim Zaks (Wooga) explain how the introduction of strict ECS architecture in Unity helped them to achieve easy to test, robust and scalable game logic. It also helped them to extract this logic and run it on a server. At Unite Europe 2015 they introduced their Open Source project Entitas-CSharp, which helped them achieve all the benefits they listed before. This year they present an example which explains how ECS and Unity can co-exist and empower developers to have a clean, scalable and testable architecture. They cover the following topics: - User Input - Integration with Unity Collision System - Reactive UI - Re-Playable games Help us caption & translate this video! http://amara.org/v/V6ZJ/
·youtube.com·
Unite Europe 2016 - ECS architecture with Unity by example
GitHub - donnemartin/system-design-primer: Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
GitHub - donnemartin/system-design-primer: Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards. - GitHub - donnemartin/system-design-primer: Learn how to design large-scale systems. Prep ...
·github.com·
GitHub - donnemartin/system-design-primer: Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
Greg Young - CQRS and Event Sourcing - Code on the Beach 2014
Greg Young - CQRS and Event Sourcing - Code on the Beach 2014
Watch Greg Young's talk "CQRS and Event Sourcing" from Code on the Beach 2014 at One Ocean Resort & Spa, Atlantic Beach, Florida. Saturday, August 9, 2014. www.codeonthebeach.com Abstract: "Looking at mature domains it is odd that almost none have a concept of current state but instead are built off a set of facts that occurred; is your bank balance a column in a table? This is not by accident and there are many benefits to having this viewpoint of a system both from a business and a technological viewpoint. In this talk we will look at what cqrs (command and query responsibility segregation) and event sourcing are."
·youtube.com·
Greg Young - CQRS and Event Sourcing - Code on the Beach 2014
Growing a Language, by Guy Steele
Growing a Language, by Guy Steele
Guy Steele's keynote at the 1998 ACM OOPSLA conference on "Growing a Language" discusses the importance of and issues associated with designing a programming language that can be grown by its users. ACM OOPSLA conference Speaker: Guy L. Steele Jr.
·youtube.com·
Growing a Language, by Guy Steele
Hashing, Encryption and Encoding ⋆ Mark McDonnell
Hashing, Encryption and Encoding ⋆ Mark McDonnell
Introduction I’ve written previously (and in-depth) on the subject of security basics, using tools such as GPG, OpenSSH, OpenSSL, and Keybase. But this time I wanted to focus in on the differences between encryption and hashing, whilst also providing a slightly more concise reference point for those already familiar with these concepts. Before we get started, let’s see what we’ll be covering: Terminology Hashing vs Encryption MAC vs HMAC Base64 Encoding Random Password Generation Hash Functions shasum hashlib cksum OpenSSH OpenSSL Generating a key pair Encrypting and Decrypting Randomness GPG Generating a key pair Automate Asymmetrical Encryption and Decryption Symmetrical Encryption and Decryption Signing keys Signing encrypted files Keybase Terminology OK, so using the correct terminology is essential and helps us to be explicit and clear with what we really mean.
·integralist.co.uk·
Hashing, Encryption and Encoding ⋆ Mark McDonnell
OWASP Top Ten Web Application Security Risks | OWASP
OWASP Top Ten Web Application Security Risks | OWASP
The OWASP Top 10 is the reference standard for the most critical web application security risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing your software development culture focused on producing secure code.
·owasp.org·
OWASP Top Ten Web Application Security Risks | OWASP
RegexHQ
RegexHQ
Collaboration on a world-wide community-driven collection of RegExp patterns and tools that can make our life easier. - RegexHQ
·github.com·
RegexHQ