Reading List

Reading List

32984 bookmarks
Custom sorting
The Debugging Mindset - ACM Queue
The Debugging Mindset - ACM Queue
Software developers spend 35-50 percent of their time validating and debugging software. The cost of debugging, testing, and verification is estimated to account for 50-75 percent of the total budget of software development projects, amounting to more than $100 billion annually. While tools, languages, and environments have reduced the time spent on individual debugging tasks, they have not significantly reduced the total time spent debugging, nor the cost of doing so. Therefore, a hyperfocus on elimination of bugs during development is counterproductive; programmers should instead embrace debugging as an exercise in problem solving.
·queue.acm.org·
The Debugging Mindset - ACM Queue
Making Badass Developers - Kathy Sierra (Serious Pony) keynote
Making Badass Developers - Kathy Sierra (Serious Pony) keynote
For a free sample of Kathy's book, visit: http://goo.gl/AU7A6j From Fluent 2015. "Every moment of every day there’s a new language, framework, format, protocol to learn. Nobody has a more dynamic skill set than a web developer. We’ll look at the one metaskill to rule them all: The ability to come up to speed and stay there, over and over again. Abouyt Kathy Sierra (SeriousPony): Kathy Sierra worked as a game programmer, interaction designer, and learning specialist (Sun Microsystems, UCLA Extension) before creating the best-selling Head First series for O’Reilly. She was the original creator of one of the largest software developer communities, javaranch.com."
·youtube.com·
Making Badass Developers - Kathy Sierra (Serious Pony) keynote
Google I/O 2009 - The Myth of the Genius Programmer
Google I/O 2009 - The Myth of the Genius Programmer
Google I/O 2009 - The Myth of the Genius Programmer Brian Fitzpatrick, Ben Collins-Sussman A pervasive elitism hovers in the background of collaborative software development: everyone secretly wants to be seen as a genius. In this talk, we discuss how to avoid this trap and gracefully exchange personal ego for personal growth and super-charged collaboration. We'll also examine how software tools affect social behaviors, and how to successfully manage the growth of new ideas. For presentation slides and all I/O sessions, please go to: code.google.com/events/io/sessions.html
·youtube.com·
Google I/O 2009 - The Myth of the Genius Programmer
#NoEstimates (Allen Holub)
#NoEstimates (Allen Holub)
This keynote presents my (and many other's) thinking about #NoEstimates. It argues that estimation is a bad thing, particularly in the Agile world, and presents ways to plan that don't involve estimation.
·youtube.com·
#NoEstimates (Allen Holub)
8 Ways to Crank Up Speed in Software Development - Apptio
8 Ways to Crank Up Speed in Software Development - Apptio
Every single CEO of any IT company wants to build software faster. Time is the most expensive and valuable resource. You can’t waste it on re-work,
·targetprocess.com·
8 Ways to Crank Up Speed in Software Development - Apptio
Simple Made Easy
Simple Made Easy
Rich Hickey emphasizes simplicity’s virtues over easiness’, showing that while many choose easiness they may end up with complexity, and the better way is to choose easiness along the simplicity path.
·infoq.com·
Simple Made Easy
Category Theory in Life - Eugenia Cheng
Category Theory in Life - Eugenia Cheng
This presentation was the opening keynote of Lambda World 2017 by Dr. Eugenia Cheng. Follow: -https://www.twitter.com/47deg -https://www.twitter.com/lambda_world Visit: -https://www.47deg.com/events for more details. ___ Category theory can be thought of as being 'very abstract algebra'. It is thought of as 'too abstract' by some people, and as 'abstract nonsense' by some others. In this talk, I will show that while it is abstract, it is far from being nonsense. I will argue that the abstraction has a purpose and that broad applicability is one of the powerful consequences. To demonstrate this, I will show how I apply concepts of category theory to important questions of life such as prejudice, privilege, blame and responsibility. I will introduce the category theory concepts from scratch so no prior knowledge is needed. These concepts will include objects and morphisms, isomorphisms and universal properties.
·youtube.com·
Category Theory in Life - Eugenia Cheng
Unite Europe 2016 - ECS architecture with Unity by example
Unite Europe 2016 - ECS architecture with Unity by example
Simon Schmid (Wooga) and Maxim Zaks (Wooga) explain how the introduction of strict ECS architecture in Unity helped them to achieve easy to test, robust and scalable game logic. It also helped them to extract this logic and run it on a server. At Unite Europe 2015 they introduced their Open Source project Entitas-CSharp, which helped them achieve all the benefits they listed before. This year they present an example which explains how ECS and Unity can co-exist and empower developers to have a clean, scalable and testable architecture. They cover the following topics: - User Input - Integration with Unity Collision System - Reactive UI - Re-Playable games Help us caption & translate this video! http://amara.org/v/V6ZJ/
·youtube.com·
Unite Europe 2016 - ECS architecture with Unity by example
GitHub - donnemartin/system-design-primer: Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
GitHub - donnemartin/system-design-primer: Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards. - GitHub - donnemartin/system-design-primer: Learn how to design large-scale systems. Prep ...
·github.com·
GitHub - donnemartin/system-design-primer: Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
Greg Young - CQRS and Event Sourcing - Code on the Beach 2014
Greg Young - CQRS and Event Sourcing - Code on the Beach 2014
Watch Greg Young's talk "CQRS and Event Sourcing" from Code on the Beach 2014 at One Ocean Resort & Spa, Atlantic Beach, Florida. Saturday, August 9, 2014. www.codeonthebeach.com Abstract: "Looking at mature domains it is odd that almost none have a concept of current state but instead are built off a set of facts that occurred; is your bank balance a column in a table? This is not by accident and there are many benefits to having this viewpoint of a system both from a business and a technological viewpoint. In this talk we will look at what cqrs (command and query responsibility segregation) and event sourcing are."
·youtube.com·
Greg Young - CQRS and Event Sourcing - Code on the Beach 2014
Growing a Language, by Guy Steele
Growing a Language, by Guy Steele
Guy Steele's keynote at the 1998 ACM OOPSLA conference on "Growing a Language" discusses the importance of and issues associated with designing a programming language that can be grown by its users. ACM OOPSLA conference Speaker: Guy L. Steele Jr.
·youtube.com·
Growing a Language, by Guy Steele
Boxology
Boxology
·web.cs.wpi.edu·
Boxology
Hashing, Encryption and Encoding ⋆ Mark McDonnell
Hashing, Encryption and Encoding ⋆ Mark McDonnell
Introduction I’ve written previously (and in-depth) on the subject of security basics, using tools such as GPG, OpenSSH, OpenSSL, and Keybase. But this time I wanted to focus in on the differences between encryption and hashing, whilst also providing a slightly more concise reference point for those already familiar with these concepts. Before we get started, let’s see what we’ll be covering: Terminology Hashing vs Encryption MAC vs HMAC Base64 Encoding Random Password Generation Hash Functions shasum hashlib cksum OpenSSH OpenSSL Generating a key pair Encrypting and Decrypting Randomness GPG Generating a key pair Automate Asymmetrical Encryption and Decryption Symmetrical Encryption and Decryption Signing keys Signing encrypted files Keybase Terminology OK, so using the correct terminology is essential and helps us to be explicit and clear with what we really mean.
·integralist.co.uk·
Hashing, Encryption and Encoding ⋆ Mark McDonnell
OWASP Top Ten Web Application Security Risks | OWASP
OWASP Top Ten Web Application Security Risks | OWASP
The OWASP Top 10 is the reference standard for the most critical web application security risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing your software development culture focused on producing secure code.
·owasp.org·
OWASP Top Ten Web Application Security Risks | OWASP
Rolling Your Own Crypto
Rolling Your Own Crypto
So you want to roll your own crypto. Well, be careful. Be very careful.
·loup-vaillant.fr·
Rolling Your Own Crypto