Unsorted Bookmarks

49625 bookmarks
Custom sorting
PLASTICITY 公式サイト | ビニール傘を再利用するサスティナブル バッグ ブランド。
PLASTICITY 公式サイト | ビニール傘を再利用するサスティナブル バッグ ブランド。
PLASTICITY(プラスティシティ)は捨てられたビニール傘を再利用したプロダクトを提供するブランドです。独自の方法で何層にも重ねたプラスチックが、高品質なトートバッグやショルダーバッグに生まれ変わります。持続可能・リサイクル・サスティナブル バッグ・サステナブル・SDGs・齊藤明希・当日発送・5000円以上送料無料
·plasticity.co.jp·
PLASTICITY 公式サイト | ビニール傘を再利用するサスティナブル バッグ ブランド。
Container Platforms, Open Source and Changing Infrastructure's Impact on the OpenStack Ecosystem - The New Stack
Container Platforms, Open Source and Changing Infrastructure's Impact on the OpenStack Ecosystem - The New Stack
In this episode of The New Stack Makers, we explore how OpenStack is being put to use in containerized environments, open source projects currently shaping the ecosystem, and how the changes surrounding infrastructure have shaped OpenStack. The New Stack founder Alex Williams and co-host SolarWinds Cloud & Container Technology Leader Lee Calcote sat down for…
·thenewstack.io·
Container Platforms, Open Source and Changing Infrastructure's Impact on the OpenStack Ecosystem - The New Stack
What VRM is about – ProjectVRM
What VRM is about – ProjectVRM
ProjectVRM fosters development of tools and services that make every person both independent of others (especially companies), yet better able to engage with them. There are a lot of developers doi…
·blogs.harvard.edu·
What VRM is about – ProjectVRM
Battling Encodings - Part 1
Battling Encodings - Part 1
My programming blog, where i write about thoughts and ideas that rise during work.
·monotonically-unstable.github.io·
Battling Encodings - Part 1
Assessing the Current State of Container Security - The New Stack
Assessing the Current State of Container Security - The New Stack
Any rational organization that wishes to run mission-critical services on containers will at some point ask the question: "But is it secure? Can we really trust containers with our data and applications?" Amongst tech folks, this often leads to a containers versus virtual machines (VMs) debate and a discussion of the protection provided by the…
·thenewstack.io·
Assessing the Current State of Container Security - The New Stack
Scalable and secure access with SSH | Engineering Blog | Facebook Code | Facebook
Scalable and secure access with SSH | Engineering Blog | Facebook Code | Facebook
Consistent security controls and high reliability are common expectations for any systems administrator. How do you deliver both on a network with thousands of servers supporting thousands of engineers? Most off-the-shelf solutions require a compromise in at least one of these areas — and we refused to accept this. Most systems administrators use the industry-standard [...]Read More...
·code.facebook.com·
Scalable and secure access with SSH | Engineering Blog | Facebook Code | Facebook
UnifyID wants to bury the password once and for all | TechCrunch
UnifyID wants to bury the password once and for all | TechCrunch
The old-fashioned password gets little respect from hackers these days. In fact, it's barely a speed bump for them to get past. The hacker can find your password or even the answers to your "security" questions for sale on the internet black market. UnifyID, a participant in this year's TechCrunch Disrupt SF Battlefield competition, sees a system that's hopelessly broken -- and they think they have a way to fix it.
·techcrunch.com·
UnifyID wants to bury the password once and for all | TechCrunch
Someone Is Learning How to Take Down the Internet - Lawfare
Someone Is Learning How to Take Down the Internet - Lawfare
Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely calibrated attacks designed to
·lawfareblog.com·
Someone Is Learning How to Take Down the Internet - Lawfare
Seth's Blog: A value creation checklist
Seth's Blog: A value creation checklist
This project you’re working on, the new business or offering, what sort of value does it create? Who is it for? What mindset and worldview and situation?Is it paid for by organizations or individua…
·sethgodin.typepad.com·
Seth's Blog: A value creation checklist
Container Networking: A Breakdown, Explanation and Analysis - The New Stack
Container Networking: A Breakdown, Explanation and Analysis - The New Stack
While many gravitate toward network overlays as a popular approach to addressing container networking across hosts, the functions and types of container networking vary greatly and are worth better understanding as you consider the right type for your environment. Some types are container engine-agnostic, and others are locked into a specific vendor or engine. Some…
·thenewstack.io·
Container Networking: A Breakdown, Explanation and Analysis - The New Stack
Kentik Is a Data Engine Modeled after Google Dremel - The New Stack
Kentik Is a Data Engine Modeled after Google Dremel - The New Stack
San Francisco-based startup Kentik takes a big data approach to network traffic intelligence in a SaaS model for companies such as Box, Dailymotion and Yelp. It relies on what it calls its “post-Hadoop big data engine,” to offer sub-minute response to simultaneous queries from multiple users on billions of records to provide insight into network…
·thenewstack.io·
Kentik Is a Data Engine Modeled after Google Dremel - The New Stack
Telemetry: What It Is, What It Isn't, and Why It's Important in Distributed Systems - The New Stack
Telemetry: What It Is, What It Isn't, and Why It's Important in Distributed Systems - The New Stack
In this episode of The New Stack Makers, we learn about the nuances behind software-defined infrastructure, how new approaches to telemetry are changing the way users interact with their data and the ways that distributed analytics can be put into practice in the enterprise. The New Stack founder Alex Williams spoke with Intel Software-Defined Infrastructure (SDI)…
·thenewstack.io·
Telemetry: What It Is, What It Isn't, and Why It's Important in Distributed Systems - The New Stack
Why Enterprises Are Embracing Microservices and Node.js - The New Stack
Why Enterprises Are Embracing Microservices and Node.js - The New Stack
Most software projects start with solving one problem. Then comes another one and the project continues growing without the engineering team being able to cope with it. This is how monoliths are built. Every new feature gets added to the existing application making it more and more complex. Scaling becomes hard and resource-wasting since everything…
·thenewstack.io·
Why Enterprises Are Embracing Microservices and Node.js - The New Stack
The Five Principles of Monitoring Microservices - The New Stack
The Five Principles of Monitoring Microservices - The New Stack
The need for microservices can be summed up in just one word: speed. The need to deliver more functionality and reliability faster has revolutionized the way developers create software. Not surprisingly, this change has caused ripple effects within software management, including monitoring systems. In this post, we’ll focus on the radical changes required to monitor…
·thenewstack.io·
The Five Principles of Monitoring Microservices - The New Stack
Engineers propose a technology to break the net neutrality deadlock
Engineers propose a technology to break the net neutrality deadlock
Stanford engineers have invented a technology that would allow an internet user to tell network providers and online publishers when and if they want content or services to be given preferential delivery, ...
·phys.org·
Engineers propose a technology to break the net neutrality deadlock
UnifyID and Continuous Authentication
UnifyID and Continuous Authentication
So I was just watching the pitches for the six Disrupt finalists, and there were a couple that had The Glow for me. First, was Carbon Health, which is
·danielmiessler.com·
UnifyID and Continuous Authentication