Technology Commentary

Technology Commentary

8149 bookmarks
Custom sorting
Using MQL to Stop Novel Email Phishing Attacks
Using MQL to Stop Novel Email Phishing Attacks
To handle the evolving nature of phishing threats, Message Query Language (MQL) was created to gain visibility into email attack patterns and give defenders control of their email environment.
·thenewstack.io·
Using MQL to Stop Novel Email Phishing Attacks
Infrastructure: From Zero to Enterprise
Infrastructure: From Zero to Enterprise
Back when I was coding in 2007, my stack was straightforward. I had a shared hosting provider that cost me about 2 dollars per month (which I paid for a
·vadimkravcenko.com·
Infrastructure: From Zero to Enterprise
The three types of time
The three types of time
Handling dates and times in code can be tricky. Understanding that there are three types of time —  and knowing which one you’re dealing…
·david-gilbertson.medium.com·
The three types of time
Microsoft Graveyard
Microsoft Graveyard
Microsoft Graveyard is the virtual graveyard for all products killed by Microsoft; a free and open source collection of dead Microsoft products built by a passionate and nostalgic community.
·microsoftgraveyard.com·
Microsoft Graveyard
BackBox bolsters network automation platform with zero-trust tools
BackBox bolsters network automation platform with zero-trust tools
Upgrades to BackBox’s automation platform are aimed at making it easier for network teams to implement zero-trust security functions, including privileged access management and vulnerability management.
·networkworld.com·
BackBox bolsters network automation platform with zero-trust tools
Move beyond tech silos with secure, outcome-driven, and converged networking solutions
Move beyond tech silos with secure, outcome-driven, and converged networking solutions
Embracing a platform approach to secure networking ensures IT leaders have the flexibility to chart their organization’s path to convergence based on its unique functional requirements, preferred consumption models, and business objectives.
·networkworld.com·
Move beyond tech silos with secure, outcome-driven, and converged networking solutions
Separation of Concerns in Cross-Compilation
Separation of Concerns in Cross-Compilation
Managing complex C++ projects across multiple platforms often ends up being afrustrating and time-consuming task.However, this common challenge faced also by the most experienced softwaredevelopers doesn’t have to be an inevitable struggle.Imagine a world where cross-compilation is not just feasible, but also efficientand less cumbersome.I have noticed in several past friendly discussions with other engineers thatmany are not at all familiar with the type of Separation of Concerns that Nixdidn’t invent but also uses.
·nixcademy.com·
Separation of Concerns in Cross-Compilation
Which is Cheaper: Serverless or Servers?
Which is Cheaper: Serverless or Servers?
Taking a simplified look at the costs of running workloads on common AWS compute services. TL;DR? “It depends”.
·itnext.io·
Which is Cheaper: Serverless or Servers?
Measuring Developer Productivity: Real-World Examples
Measuring Developer Productivity: Real-World Examples
A deepdive into developer productivity metrics used by Google, LinkedIn, Peloton, Amplitude, Intercom, Notion, Postman, and 10 other tech companies
·newsletter.pragmaticengineer.com·
Measuring Developer Productivity: Real-World Examples
Enabling AI in IoT Apps with a Cloud-to-Edge Database
Enabling AI in IoT Apps with a Cloud-to-Edge Database
Locating data and AI models close to the point of interaction is key to developing AI-powered apps that are always fast and always on.
·thenewstack.io·
Enabling AI in IoT Apps with a Cloud-to-Edge Database
Use a FinOps Model to Control Hybrid Cloud Costs
Use a FinOps Model to Control Hybrid Cloud Costs
Deeper financial analysis and earlier strategic thinking will result in a hybrid cloud deployment that delivers clearer ROI.
·thenewstack.io·
Use a FinOps Model to Control Hybrid Cloud Costs
What is X-Forwarded-For and when can you trust it?
What is X-Forwarded-For and when can you trust it?
The X-Forwarded-For (XFF) HTTP header provides crucial insight into the origin of web requests. The header works as a mechanism for…
·httptoolkit.com·
What is X-Forwarded-For and when can you trust it?
Why Is Google Hiding Its Cached Search Results?
Why Is Google Hiding Its Cached Search Results?
Google appears to hide away an key feature from its search engine—an easily accessible cache of search results. (It’s still there, if you know where to look.)
·tedium.co·
Why Is Google Hiding Its Cached Search Results?
John Battelle's Search Blog The Question Google Won’t Answer
John Battelle's Search Blog The Question Google Won’t Answer
Reading Ben Thompson’s coverage of Google’s earnings call this week,  one thing jumps out, and simply can’t be ignored: Google CEO Sundar Pichai was asked a simple question, and, …
·battellemedia.com·
John Battelle's Search Blog The Question Google Won’t Answer
Future Embarrassments
Future Embarrassments
Because moral progress is real (we improve our morality over time) new generations will inevitably see moral deficiencies in previous generations. To some degree we can guess and anticipate what they will find embarrassing about us today, but it will … Continue reading →
·kk.org·
Future Embarrassments
Two-digit zip codes
Two-digit zip codes
How are populations distributed if you roll up zip code regions to just the first two digits? What about just the first digit?
·johndcook.com·
Two-digit zip codes
2023 Year In Review
2023 Year In Review
Yet Another Software Engineer's Blog
·brianmeeker.me·
2023 Year In Review
Falling into the Star Gate of Hidden Microservices Costs
Falling into the Star Gate of Hidden Microservices Costs
Microservices might simplify coordination and collaboration at scale, but transform all your hard work into costs that line someone else’s pocket.
·thenewstack.io·
Falling into the Star Gate of Hidden Microservices Costs