I have built quite the reputation as an IPv6 contrarian over the years, particularly as I yearly criticize FOSDEM for describing their dual-stack network as a “legacy” network. As I kee…
I’ve tried to write a blog post on tag systems for years now. Literally years, I think I first started drafting it out in 2018 or so? The problem is that...
Under Linux, libSegFault and addr2line are underrated
Many modern programming languages like Java produce useful error messages when they fail. Some indicate where in the program (e.g., down to the line of source code) the failure occurred. Slowly, the C++ language is moving in this direction. A particularly nasty problem in C and C++ are segmentation faults: they occur when you are … Continue reading Under Linux, libSegFault and addr2line are underrated
How to Decide Between a Layer 2 or Layer 3 Network
Layer 2 Data Link connectivity provides low latency while Layer 3 Network Link offers greater scalability. Which is the right one for your workloads? Nokia has some answers.
Assessing the Usability of a User Interface Standard
This paper by Henrik Thovtrup and Jakob Nielsen illustrates how user interface standards can be hard to use for developers. Two experiments demonstrate that compliance with standards is limited in both laboratory and corporate settings.
Confessions of a Socialist Entrepreneur - Peter Barnes
The Washington Monthly, October 1983 SEVEN YEARS AGO, at the age of 34, I decided to become a socialist entrepreneur. It seemed like a logical calling to pursue. As a muckraking journalist, I’d flung my share of arrows at the big corporations, although I inwardly feared they were invincible because no one else could deliver... Read more...
Who are you, or rather, who does the algorithm think you are? If we form our identities by the information we receive, it is uncertain how much of who we are is constituted by an algorithm. Do algorithms determine what we find meaningful?
Selecting the Best Authorization for Your API Integrations
API calls require authorization. How do you select the best authorization mechanism? This post lists the different authorization options and answers which mechanism is the best!