Why's that company so big? I could do that in a weekend
Unsorted Bookmarks
Authenticated access to Kubernetes pods | pedrormarques
When running a micro-services style application in a public cloud, one of the problems to solve is how to provide access to debug information. At Laserlike, we run our application stack on GKE. Mos…
Beirut’s lessons for how not to rebuild a war-torn city - The Washington Post
Beirut’s post-civil war reconstruction is an example of what to avoid when working with war-torn Syrian cities.
Five Books to Change Liberals' Minds - Bloomberg View
Email security: We CAN fix the tech, but what about the humans? • The Register
From Michelangelo to ransomware
Kristin Skinner on designing design organizations - O'Reilly Media
The O’Reilly Design Podcast: Design investment, the importance of mindset, and creating the right environment.
Understanding predictive analytics - O'Reilly Media
The O’Reilly Data Show Podcast: Natalino Busa on developments in feature engineering and predictive techniques across industries.
TensorFlow on Android - O'Reilly Media
Take deep learning mobile.
Capturing semantic meanings using deep learning - O'Reilly Media
Word embedding in natural language processing.
Making continuous delivery a reality at a large enterprise - O'Reilly Media
Learn how Capital One implemented continuous delivery, streamlined and automated the release management process, and overcame common roadblocks.
Making a market in status - O'Reilly Media
James Nord of Fohr Card shows us how the reputation gained through social media gets traded or converted into cash.
Rovanion/webgl-clojurescript-tutorial: Guide through the basics of setting up a ClojureScript program with thi.ng/geom and Figwheel to interactively program WebGL.
Guide through the basics of setting up a ClojureScript program with thi.ng/geom and Figwheel to interactively program WebGL. - GitHub - Rovanion/webgl-clojurescript-tutorial: Guide through the basi...
Why is Apache Vulnerable by Default?
6 Risks Still Around For No Reason
An Argument for Automation – Medium
Git as a NoSql database | Kenneth Truyers
Git’s man-pages state that it’s a stupid content tracker. It’s probably the most used version control system in the world. Which is very strange, since it doesn’t describe itself as being a source control system. And in fact, you can use git to track any type
Introducing HTTP Tracing - The Go Blog
Go is an open source programming language that makes it easy to build simple, reliable, and efficient software.
Joyent | Post-mortem Debugging and Promises
An overview of post-mortem debugging pitfalls when using promises.
If entropy is always increasing, where does complexity come from?
Per the second law of thermodynamics, the total entropy of a closed system is always increasing. So how does complexity arise out of that? More colloquially, if everything in the Universe is always falling apart, how d
I Would Love To Live In A Country Where... - The Establishment
How Kafka’s Storage Internals Work – The Hoard – Medium
In this post I’m going to help you understand how Kafka stores its data.
Network Automation RFP Requirements « ipSpace.net by @ioshints
After finishing the network automation part of a recent SDN workshop I told the attendees “Vote with your wallet. If your current vendor doesn’t support the network automation functionality you need, move on.” Not surprisingly, the next question was “And what shall we ask for?” Here’s a short list of ideas, please add yours in comments.
The Wild West Of Performance Measurement: Using Data To Ensure Optimal Vendor Selection
Data-driven decision making relies on contextual understanding of how data is gathered and the type of analysis used to arrive at an outcome. The popularity of data-driven decision-making has increased the number of companies using statistics to support a preference or vendor selection. The Internet Performance Management (IPM) market hasn't been spared, but, unlike other markets where institutions have codified a standard for qualification and quantification, such as the FDA's nutrition labels, Insurance Institute for Highway Safety, or the Coffee Quality Institute, the IPM market is still in the Wild West stage.
The psychological reasons behind risky password practices - Help Net Security
When it comes to online security, personality type does not inform behavior, but it does reveal how consumers rationalize poor password habits.
How Cloud Architects Could Save the IT Department from Disappearing - The New Stack
Everybody in IT is talking about getting rid of silos. You have to “free” your data and apps from the closed systems they run in to take advantage of the Big Three: cloud infrastructure, big data, and real-time analytics. Yet nobody’s doing much talking about the one silo that threatens to undo all the other…
Rethinking Infrastructure, an Interview With Docker's Security Director - The New Stack
Docker's emphasis on the customer's experience is a hallmark of its stated mission to create tools of mass innovation. That philosophy is directly relevant to Docker 1.12, which integrates clustering and orchestration into the Docker Engine itself. Nathan McCauley is director of security for Docker. Earlier this summer, McCauley spoke with Lee Calcote, one of the…
Mesosphere's Data Center Operating System Now Includes a Scheduler and Orchestrator - The New Stack
One of the guiding principles of open source software, especially in the infrastructure space, is the “batteries included but swappable” ethic that maintains that users and implementers should always have a clear choice of pluggable components. It’s part of the “agnosticism” that defines many of the companies in The New Stack space — for example,…
3 file conversion tools for the Linux command line | Opensource.com
From time to time, everyone needs to convert a file from one format to another. Here are three terminal tools for Linux to help make conversion easy.
How to use Krita for animation | Opensource.com
Animation isn't easy, but the good news is that open source supplies plenty of high-quality animation tools.
Fast Linux Packet Forwarding with Thomas Graf on Software Gone Wild « ipSpace.net by @ioshints
We did several podcasts describing how one could get stellar packet forwarding performance on x86 servers reimplementing the whole forwarding stack outside of kernel (Snabb Switch) or bypassing the Linux kernel and moving the packet processing into userspace (PF_Ring). Now let’s see if it’s possible to improve the Linux kernel forwarding performance. Thomas Graf, one of the authors of Cilium claims it can be done and explained the intricate details in Episode 64 of Software Gone Wild.
AWS has made VMware the Airbnb of the cloud • The Register
Which is clever, but 'hybrid virtualisation', not hybrid cloud, won't combat Microsoft