Technology Commentary

Technology Commentary

8145 bookmarks
Custom sorting
Cloud computing has an ROI problem
Cloud computing has an ROI problem
Data from Australia confirms that the high cost of scalability and agility is forcing some enterprises to rethink their cloud strategies.
·infoworld.com·
Cloud computing has an ROI problem
Conference Report: Goatmire Elixir 2025
Conference Report: Goatmire Elixir 2025
The quiet was unsettling. The lack of concrete things to do was stressful. Me and my wife had been fretting and flitting around the house for most of the day making sure everything was staged, that we had the various prints, checklists were ready, lots of bags and boxes were packed. The event wasn't even starting today, not even fully tomorrow. The quiet after intense preparation.
·underjord.io·
Conference Report: Goatmire Elixir 2025
[Outliers] Ed Stack: Lessons from Dick’s Sporting Goods
[Outliers] Ed Stack: Lessons from Dick’s Sporting Goods
Ed Stack built Dick’s Sporting Goods from a struggling family store into an empire of more than 800 stores and billions in sales. Along the way he nearly lost everything. Multiple times. This episode is the story of what he did, how he did it, and the lessons you can learn. Coming Soon: Apple Podcasts …
·fs.blog·
[Outliers] Ed Stack: Lessons from Dick’s Sporting Goods
Hope Is Not a Strategy
Hope Is Not a Strategy
Open source software is often the unglamorous workhorse in your server rack, the silent operator in your stack, and the punk soul in your operations pipeline.  It's thoroughly tested and trusted for all the right reasons. But when your business depends on it, you still need a lifeline. "Having enterprise-grade
·blog.nlnetlabs.nl·
Hope Is Not a Strategy
OTW - Bandit Level 4 to Level 5
OTW - Bandit Level 4 to Level 5
Learn what are binary files, how they are different from text files and why do we need them. Use the tools like xxd and file to read and interpret binary information and solve bandit level 5 challenge.
·tbhaxor.com·
OTW - Bandit Level 4 to Level 5
Hypervisor in 1,000 Lines
Hypervisor in 1,000 Lines
Write your first hypervisor from scratch, in 1K LoC.
·1000hv.seiya.me·
Hypervisor in 1,000 Lines
Privacy for subdomains: the problem
Privacy for subdomains: the problem
I recently learned about a new way to leak your privacy, and it’s a scary one. Before going further, know that I’m not a network engineer: perhaps if you work in this field, you’ve known it for your whole career, but it’s quite new to me. Let me share my findings, and you can judge for yourself. Since the original post was quite lengthy, I have broken it down into two installments: the problem and the solution. The situation I own my own domain. I’ve created mu
·blog.frankel.ch·
Privacy for subdomains: the problem
Jenny’s Daily Drivers: FreeDOS 1.4
Jenny’s Daily Drivers: FreeDOS 1.4
When I was a student, I was a diehard Commodore Amiga user, having upgraded to an A500+ from my Sinclair Spectrum. The Amiga could do it all, it became my programming environment for electronic eng…
·hackaday.com·
Jenny’s Daily Drivers: FreeDOS 1.4
A GEM Of A Desktop Environment
A GEM Of A Desktop Environment
Desktop environments are the norm as computer interfaces these days, but there was once a time when they were a futuristic novelty whose mere presence on a computer marked it out as something speci…
·hackaday.com·
A GEM Of A Desktop Environment
Slow social media
Slow social media
How can we design better platforms?
·herman.bearblog.dev·
Slow social media
Anti-Scheming
Anti-Scheming
Apollo Research & OpenAI find that anti-scheming training in frontier AI models significantly reduced covert behaviours, but did not eliminate them.
·antischeming.ai·
Anti-Scheming
Detecting and reducing scheming in AI models | OpenAI
Detecting and reducing scheming in AI models | OpenAI
Together with Apollo Research, we developed evaluations for hidden misalignment (“scheming”) and found behaviors consistent with scheming in controlled tests across frontier models. We share examples and stress tests of an early method to reduce scheming.
·openai.com·
Detecting and reducing scheming in AI models | OpenAI
An E-bike For The Mind
An E-bike For The Mind
E-bikes and what they can teach us about AI
·joshbrake.substack.com·
An E-bike For The Mind
History of DBMS - GeeksforGeeks
History of DBMS - GeeksforGeeks
Your All-in-One Learning Portal: GeeksforGeeks is a comprehensive educational platform that empowers learners across domains-spanning computer science and programming, school education, upskilling, commerce, software tools, competitive exams, and more.
·geeksforgeeks.org·
History of DBMS - GeeksforGeeks
A Timeline of Database History | Quickbase
A Timeline of Database History | Quickbase
Learn about the history of databases in an easy-to-read timeline, from the first computerized databases in the 1960s to the powerful technologies of today.
·quickbase.com·
A Timeline of Database History | Quickbase
​Before the Web: Online services of yesteryear
​Before the Web: Online services of yesteryear
Before we were watching Netflix movies, video-conferencing with our friends, and playing real-time video games on the Internet, we were using online services, such AOL, CompuServe, and GEnie to talk about movies, type letters to our buddies, and play ASCII, turn-based games.
·zdnet.com·
​Before the Web: Online services of yesteryear
Why are Event-Driven Systems Hard?
Why are Event-Driven Systems Hard?
Understanding the Core Challenges of Asynchronous Architectures
·newsletter.scalablethread.com·
Why are Event-Driven Systems Hard?
DNSSEC Operations in 2026 – What Keeps 16 TLDs Up at Night
DNSSEC Operations in 2026 – What Keeps 16 TLDs Up at Night
Before building a successor to OpenDNSSEC, we asked 16 TLD operators what they needed. We expected tool talk—instead, we ended up discussing trust, continuity, and compliance.
·blog.nlnetlabs.nl·
DNSSEC Operations in 2026 – What Keeps 16 TLDs Up at Night