Automated browser testing for the modern web development stack | TestCafe
Unsorted Bookmarks
memstate
memstate - streamed persistent state as a service. Coming soon to a cloud near you!
Breaking Down Mirai: An IoT DDoS Botnet Analysis
In this post we share information from our own encounters with Mirai botnets as well as the results of our investigation of Mirai’s source code.
Google Capitulates to Facebook's Identity Machine: Is This Good News For The Open Web? - John Battelle's Search Blog
Long time readers of this site know that once a year I make predictions, and revisit those I made the year before. But it’s not often I look back farther than one year to see if perhaps I was…
Hacked Cameras, DVRs Powered Today’s Massive Internet Outage — Krebs on Security
A massive and sustained Internet attack that has caused outages and network congestion today for a large number of Web sites was launched with the help of hacked "Internet of Things" (IoT) devices, such as CCTV video cameras and digital…
How the Web Became Unreadable
I thought my eyesight was beginning to go. It turns out, I’m suffering from design.
How to design APIs that don’t suck – Medium
Other developers actually have to use the APIs you design. So don’t let those APIs suck. If you don’t want hordes of angry programmers to…
Build a Talking Radio That Reads Incoming Notifications With a Raspberry Pi
The idea of a machine that talks to you intelligently might be a ways off still, but Instructables user MisterM wanted to make a radio that’d announce general details throughout the day. To do this, he wired up a Raspberry Pi Zero to a text-to-speech engine, then tossed in a dose of If This Then That.
Commonwealth Banks' cotton bale blockchain experiment could change trade forever
When the Marie Schulte rounds the breakwater off the Chinese port of Qingdao in early November, bankers on two continents will be watching anxiously.
The De-Democratization of Online Publishing | Tech.pinions - Perspective, Insight, Analysis
Building a Bank with Kubernetes - Presentation :tv: - Monzo - Monzo Community
From @oliver’s talk at the London Kubernetes meetup Video - https://skillsmatter.com/skillscasts/9146-building-a-microservices-with-kubernetes For more discussion, Monzo has a developer Slack community, which you can sign up to here.
Aldous Huxley 1962 U.C. Berkeley Speech on “The Ultimate Revolution” | Public Intelligence
[stream provider=sound flv=x:/info.publicintelligence.net/Huxley_ultimate_revolution_64kb.mp3 img=x:/publicintelligence.net/aldous_huxley.jpg embed=true share=true width=560 height=450 dock=true contr
Audit reveals significant vulnerabilities in Truecrypt and its successors / Boing Boing
Veracrypt was created to fill the vacuum left by the implosion of disk-encryption tool Truecrypt, which mysteriously vanished in 2014, along with a “suicide note” (possibly containing a…
GitHub - HouzuoGuo/headmore: A fully functional VNC client for your geeky character terminals (Linux VT, xterm, and more).
Top geek’s VNC client that runs in Linux terminal (Linux VT console, xterm, and more) - GitHub - HouzuoGuo/headmore: Top geek’s VNC client that runs in Linux terminal (Linux VT console, xterm, and ...
How to Install and Use Acct to Monitor a Users Activity on Ubuntu-14.04
IntroductionAcct is an open source tool for monitoring a users activity on Linux system. It is a most important task for every system administrator to monitor all the activity by all users and proce
pg-cert-check: A tool to monitor postgresql database SSL certificates - chr4
I recently wrote pg-check-cert, a small tool to check whether a postgresql server’s SSL certificate is about to expire. It was featured in PostgreSQL Weekly Issue 164. This script connects to a postgresql instance, checks the certificate and displays the amount of days left before it expires. It’s intended to be used for monitoring your postgresql certificates, using a monitoring tool like Zabbix or Nagios.
The Network Is Reliable and Other Stories « ipSpace.net by @ioshints
I was cleaning my Blog Post Ideas Evernote notebook and found these gems hidden deep inside its bowels: I still haven’t found the presentation in which someone (from Facebook?) explained how long DNS information with long-expired TTLs persists in the clients. Relevant links would be highly appreciated.
Webhooks Provide an Efficient Alternative to API Polling - The New Stack
Popular websites like GitHub and Slack don’t just offer webhooks because they are a convenient way to inform their users of new events, webhooks are also a way for these sites to maintain stability. At OSCON Europe last week, Lorna Mitchell, a developer advocate with IBM Cloud Data Services, provided some insight into “The wonderful world of…
7 signs a scientific paper's authorship was bought - Retraction Watch at Retraction Watch
Did you know there is a black market for scientific papers? Unfortunately, there is a growing trend of authors purchasing a spot on the author list of papers-for-sale – and the better the journal, …
Multi-armed Bayesian Bandits - Sortable Engineering Blog
Swiss Train Deployments
Stability without stagnation is a philosophy, but it's also about developing a process and a foundation that keeps you from getting stuck without innovating.
Binary Mechanical Keyboard! - Album on Imgur
Post with 4146 views. Binary Mechanical Keyboard!
Expect a Move Towards Internet Resilience
With the recent DDoS attacks against Brian Krebbs and DYN DNS, I had an idea about how the industry is going to respond. I think we're about to see big
How the Soviets invented the internet and why it didn't work | Aeon Essays
Soviet scientists tried for decades to network their nation. What stalemated them is now fracturing the global internet
Coding like Shakespeare: practical function naming conventions
Favorite Tools - Look Up Tables - Matthew Eshleman
As we grow in our engineering careers, we must continually add new tools to our collective tool kits. One favorite tool in my toolkit will be obvious to many experienced embedded software engineers. I still remember learning this approach early...
IoT Scanner Checks for Vulnerabilities In Your Connected Devices
Last week’s DDoS attack on Dyn that shut down portions of the internet was fueled by bots created from hacked connected devices, like internet-connected cameras and DVRs, but can also theoretically include connected routers, printers, and more. While there’s not exactly a fix for this problem, IoT Scanner is a tool…
Multithreaded Asynchronous I/O & I/O Completion Ports | Dr Dobb's
I/O completion ports provide an elegant solution to the problem of writing scalable server applications that use multithreading and asynchronous I/O.
A Devil’s Dictionary of Educational Technology – Medium
In the dark spirit of Ambrose Bierce, let us consider new definitions of familiar terms. Specifically, let’s see what happens when we give…
Simple Made Easy
Rich Hickey emphasizes simplicity’s virtues over easiness’, showing that while many choose easiness they may end up with complexity, and the better way is to choose easiness along the simplicity path.