A Gentle Introduction to Data Structures: How Stacks Work
by Michael Olorunnisola A Gentle Introduction to Data Structures: How Stacks WorkAnyone who’s applied for a developer job at a large tech company — and spent days practicing common algorithm interview questions — has probably concluded: “Wow. I really gotta know data structures cold.”What are data structures? And why are
Your HTTPS Certificate Shows Where Its Key Comes From – Magic Security
printWe have extended the original research and can now use information from public keys (HTTPS, TLS, SSH, SSL) to audit cyber security management and compliance with internal standards. This post is about our application of a research I blogged about earlier – Investigating The Origins of RSA Public Keys. You can also visit: https://enigmabridge.com/https.html . The main purpose … Continue reading Your HTTPS Certificate Shows Where Its Key Comes From →
Engineering Infrastructure at Scale: Overview | LinkedIn Engineering
This blog series will describe the engineering infrastructure (technologies, processes, tools, and culture) that enable several hundred engineers across LinkedIn to innovate and release software continuously with agility, quality, and productivity. This post gives an overview of the overall architecture, workflow, and scale.
Why CTOs are Warming Up to Microservices - The New Stack
Chief technology Officers have a tough job. The sheer number of technologies competing for attention and adoption are making it harder than ever to find signals through the deafening noise. When a trend like microservices comes along, it's easy to write it off as the latest incarnation of SOA — a theoretically interesting idea that will…
Applying Queueing Theory to Dynamic Connection Pool Sizing with FlexyPool – Java, SQL and jOOQ.
I’m very happy to have another interesting blog post by Vlad Mihalcea on the jOOQ blog, this time about his Open Source library flexypool. Read his previous jOOQ Tuesdays post on Hibernate he…
From mobile first to mobile native — Benedict Evans
What happens if you just forget about the PC altogether? But also, what happens if you forget about featurephones? What happens if you presume all of the sophistication that a modern smartphone has and a PC does not, and if you also presume that, with 650m iPhones in use and 2.5bn smartphones in tot
Is Your Infrastructure Ready for a Decoupled Deployment? - The New Stack
As Brendan Burns once explained eloquently, Kubernetes was built on the premise of decoupling a whole slew of microservices from being highly connected, interdependent problems so that one minor change does not result in a ripple effect and bring the entire application down. As Kubernetes adoption picks up, I set out to know if my…
Hyper.sh Mixes Containers, Hypervisors, and Something Called ‘Hypernetes’ - The New Stack
A new container technology called Hyper.sh or just “Hyper” (formerly HyperHQ, and not to be confused with Microsoft’s Hyper-V), could conceivably alter the course of containerization. Like dotCloud, which eventually became Docker, Hyper is a containerized workload deployment and hosting service. It’s a PaaS that calls itself a “CaaS” (containers-as-a-service). Its infrastructure is entirely open source and…
Looking at How to Look at Kubernetes - The New Stack
A few weeks ago we had a chance to catch up on Kubernetes buzz with Ross Kukulinski. When he is not managing NodeSource's commercial Node.js offering, Ross helps his consulting clients implement Kubernetes. He has been running Kubernetes in production since before it was 1.0, so he provides valuable insights, many of which he will be sharing at Node.js…
This use case discusses authentication in a self-sovereign identity system called Sovrin. Sovrin simplifies authentication, reducing friction while providing a system that businesses can trust without building or maintaining it.
Below is the estimated percentage of white population in the United States from 1970 to 2010, based on data from the Census Bureau and made more accessible by NHGIS. I like the evaporative quality …
Discogs: a business based on public domain data – Lost Boy
When I’m discussing business models around open data I regularly refer to a few different examples. Not all of these have well developed case studies, so I thought I’d start trying to c…