FullOO Home Page

System Architecture
Can types replace validation?
With some examples in C#.
Feature #16122: Data: simple immutable value object - Ruby master - Ruby Issue Tracking System
Redmine
The end of Moore's law forced YouTube to make its own video chip
Ranganathan and other Google engineers looked at the overall picture and realized transcoding (for YouTube) was consuming a large fraction of compute cycles in its data centers.
Ethernet Loses Most of The Time
NMEA Networking is not Ethernet
Bob
Terraform Kubernetes Deployment: A Detailed Walkthrough — ReleaseHub
Did you know that you can use Terraform for deployment of your Kubernetes clusters? Learn how and why to do it here.
Fast.ai's Practical Deep Learning for Coders Has Been Updated
Programming book reviews, programming tutorials,programming news, C#, Ruby, Python,C, C++, PHP, Visual Basic, Computer book reviews, computer history, programming history, joomla, theory, spreadsheets and more.
Githubnext
GitHub Next investigates the future of software development
ONDC: An Open Network for Ecommerce
Open networks provide the means for increased freedom and autonomy as more of our lives move to the digital realm. ONDC is an experiment launching in India that is hoping to bring these benefits to shoppers and merchants.
Reinforcement Learning for Budget Constrained Recommendations
by Ehtsham Elahi
with James McInerney, Nathan Kallus, Dario Garcia Garcia and Justin Basilico
What is Identity and Access Management (IAM)?
An Identity access management system is essential to any organization because it places barriers between users and vital enterprise assets.
Synthesia | #1 AI Video Generation Platform
Create AI videos by simply typing in text. Easy to use, cheap and scalable. Make engaging videos with human presenters — directly from your browser. Free demo.
Please do not use Python for tooling
Programmers like to argue over programming languages and tooling. If we remove all the pretense, it usually comes down to people defending their personal choices. We have a tendency to try to justify and protect our investment in whatever languages and tools we know and use.
Inside Tesla’s Innovative And Homegrown “Dojo” AI Supercomputer
How expensive and difficult does hyperscale-class AI training have to be for a maker of self-driving electric cars to take a side excursion to spend how
Making AI Run At Any Scale But Not At All Costs
AI is arguably the most important kind of HPC in the world right now in terms of providing immediate results for immediate problems, and particularly for
Why Memory Enclaves Are The Foundation Of Confidential Computing
Sponsored Feature There are tens of millions of lines of code in thousands of software programs, on a typical server in the datacenter. All of which
Using eBPF for network observability in the cloud
eBPF extends the Linux kernel to help you monitor the cloud.
Non-Obvious Docker Uses
Transactional Messaging in Microservices
Introduction
Problem Statement
Transactional messaging is a common problem in Microservices - how do you integrate message publishing with database transactions that update business entities or data. For e.g., we may require to publish domain events ...
unicode-hotstrings/README.md at main · dspinellis/unicode-hotstrings
Switching git back to GPG signing
Recently GitHub announced support for SSH key signing of commits, which is awesome! I followed the instructions to configure my git for SSH signing
which was very straightforward. Went to create a ...
Metamorphic Testing • Hillel Wayne
Confession: I read the ACM Magazine. This makes me a dweeb even in programming circles. One of the things I found in it is “Metamorphic Testing”. I’ve never heard of it, and nobody I knew heard about it either. But the academic literature was shockingly impressive: many incredibly successful case studies in wildly different fields. So why haven’t we heard of it before? There’s only one article anywhere targeted at people outside academia.
Managing Open Source Components with Automation, Security Teams, and Forking
Nowadays, in project development, open source projects deserve all the credit for improving our work efficiency. We use a whole host of…
The Dependency Jungle
The Dependency Tree is Actually More of a Jungle. And it’s Haunted.
Automated Dependency Management with Depfu – The New Stack
What if you had a colleague who regularly sent you pull requests to help you stay on top of dependency updates? And those pull requests included all the information required to makes those updates easily? That’s the notion behind Depfu, an automated dependency-management service that grew out of the Ruby on Rails ecosystem, but has…
Depfu: Automated dependency updates done right — for Github and Gitlab
Get the great feeling of up-to-date dependencies and secure software without all the boring manual work
Bash Loop Through Files in Directory and Subdirectories - Fedingo
Sometimes you may need to loop through files in directory and subdirectories. Here are the steps to do it using find command and for loop.
The Anti-Mac User Interface (Don Gentner and Jakob Nielsen)
We reverse all of the core design principles behind the Macintosh human interface guidelines to arrive at the characteristics of the Internet desktop.
Completely Self-Hosting Bitwarden Password Manager (Updated 2022)
This article will cover setting up your own self-hosted Bitwarden instance with Docker and configuring ngnix to allow for public exposure for cross device access to your vault.