Reading List

Reading List

32364 bookmarks
Newest
Greg Young - CQRS and Event Sourcing - Code on the Beach 2014
Greg Young - CQRS and Event Sourcing - Code on the Beach 2014
Watch Greg Young's talk "CQRS and Event Sourcing" from Code on the Beach 2014 at One Ocean Resort & Spa, Atlantic Beach, Florida. Saturday, August 9, 2014. www.codeonthebeach.com Abstract: "Looking at mature domains it is odd that almost none have a concept of current state but instead are built off a set of facts that occurred; is your bank balance a column in a table? This is not by accident and there are many benefits to having this viewpoint of a system both from a business and a technological viewpoint. In this talk we will look at what cqrs (command and query responsibility segregation) and event sourcing are."
·youtube.com·
Greg Young - CQRS and Event Sourcing - Code on the Beach 2014
Growing a Language, by Guy Steele
Growing a Language, by Guy Steele
Guy Steele's keynote at the 1998 ACM OOPSLA conference on "Growing a Language" discusses the importance of and issues associated with designing a programming language that can be grown by its users. ACM OOPSLA conference Speaker: Guy L. Steele Jr.
·youtube.com·
Growing a Language, by Guy Steele
Boxology
Boxology
·web.cs.wpi.edu·
Boxology
Hashing, Encryption and Encoding ⋆ Mark McDonnell
Hashing, Encryption and Encoding ⋆ Mark McDonnell
Introduction I’ve written previously (and in-depth) on the subject of security basics, using tools such as GPG, OpenSSH, OpenSSL, and Keybase. But this time I wanted to focus in on the differences between encryption and hashing, whilst also providing a slightly more concise reference point for those already familiar with these concepts. Before we get started, let’s see what we’ll be covering: Terminology Hashing vs Encryption MAC vs HMAC Base64 Encoding Random Password Generation Hash Functions shasum hashlib cksum OpenSSH OpenSSL Generating a key pair Encrypting and Decrypting Randomness GPG Generating a key pair Automate Asymmetrical Encryption and Decryption Symmetrical Encryption and Decryption Signing keys Signing encrypted files Keybase Terminology OK, so using the correct terminology is essential and helps us to be explicit and clear with what we really mean.
·integralist.co.uk·
Hashing, Encryption and Encoding ⋆ Mark McDonnell
OWASP Top Ten Web Application Security Risks | OWASP
OWASP Top Ten Web Application Security Risks | OWASP
The OWASP Top 10 is the reference standard for the most critical web application security risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing your software development culture focused on producing secure code.
·owasp.org·
OWASP Top Ten Web Application Security Risks | OWASP
Rolling Your Own Crypto
Rolling Your Own Crypto
So you want to roll your own crypto. Well, be careful. Be very careful.
·loup-vaillant.fr·
Rolling Your Own Crypto
RegexHQ
RegexHQ
Collaboration on a world-wide community-driven collection of RegExp patterns and tools that can make our life easier. - RegexHQ
·github.com·
RegexHQ
Fallacies
Fallacies
·pages.cs.wisc.edu·
Fallacies
There is No Now - ACM Queue
There is No Now - ACM Queue
"Now." The time elapsed between when I wrote that word and when you read it was at least a couple of weeks. That kind of delay is one that we take for granted and don
·queue.acm.org·
There is No Now - ACM Queue
Time, Clocks and the Ordering of Events in a Distributed System - Microsoft Research
Time, Clocks and the Ordering of Events in a Distributed System - Microsoft Research
Jim Gray once told me that he had heard two different opinions of this paper: that it’s trivial and that it’s brilliant. I can’t argue with the former, and I am disinclined to argue with the latter. The origin of this paper was the note The Maintenance of Duplicate Databases by Paul Johnson and Bob […]
·microsoft.com·
Time, Clocks and the Ordering of Events in a Distributed System - Microsoft Research
Designing Data-Intensive Applications by Martin Kleppmann
Designing Data-Intensive Applications by Martin Kleppmann
Designing Data-Intensive Applications book. Read 598 reviews from the world's largest community for readers. Data is at the center of many challenges in ...
·goodreads.com·
Designing Data-Intensive Applications by Martin Kleppmann
What every programmer should know about memory, Part 1
What every programmer should know about memory, Part 1
Ulrich Drepper recently approached us asking if we would be interested in publishing a lengthy document he had written on how memory and software interact. We did not have to look at the text for long to realize that it would be of interest to many LWN readers. Memory usage is often the determining factor in how software performs, but good information on how to avoid memory bottlenecks is hard to find. This series of articles should change that situation. Click below (subscribers only) for the first installment.
·lwn.net·
What every programmer should know about memory, Part 1
The Problem with Time & Timezones - Computerphile
The Problem with Time & Timezones - Computerphile
A web app that works out how many seconds ago something happened. How hard can coding that be? Tom Scott explains how time twists and turns like a twisty-turny thing. It's not to be trifled with! A Universe of Triangles: http://www.youtube.com/watch?v=KdyvizaygyY LZ Compression in Text: http://www.youtube.com/watch?v=goOa3DGezUA Characters, Symbols and the Unicode Miracle: http://www.youtube.com/watch?v=MijmeoH9LT4 More from Tom Scott: http://www.youtube.com/user/enyay and https://twitter.com/tomscott http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: http://bit.ly/bradychannels
·youtube.com·
The Problem with Time & Timezones - Computerphile
Time
Time
·unix4lyfe.org·
Time
Characters in a computer - Unicode Tutorial UTF-8 (3/3)
Characters in a computer - Unicode Tutorial UTF-8 (3/3)
This tutorial explains the utf-8 way of representing characters in a computer; later generalizing (high level) how any kind of data can be represented in a computer.
·youtube.com·
Characters in a computer - Unicode Tutorial UTF-8 (3/3)
Characters in a computer - ASCII Tutorial (1/3)
Characters in a computer - ASCII Tutorial (1/3)
Video series about how characters are represented in a computer. This first part talks about the ASCII character set and the problems associated with it.
·youtube.com·
Characters in a computer - ASCII Tutorial (1/3)
Unicode CLDR
Unicode CLDR
News 2022-06-01 General submission open for CLDR v42 2022-04-06 CLDR v41 released 2021-11-03 Links to CLDR talks at Unicode Conference #45 What is CLDR? The Unicode Common Locale Data Repository (CLDR) provides key building blocks for software to support the world's languages, with the largest
·cldr.unicode.org·
Unicode CLDR