Unsorted Bookmarks

49625 bookmarks
Custom sorting
Locking Down an SSH Server
Locking Down an SSH Server
If your host is connected to the Internet, it's likely under attack. Not theoretically... right now. Short of disallowing remote access entirely, it's wise to secure your SSH server.
·moundalexis.com·
Locking Down an SSH Server
Why Kubernetes is winning the container war | InfoWorld
Why Kubernetes is winning the container war | InfoWorld
It's all about knowing how to build an open source community -- plus experience running applications in Linux containers, which Google invented
·infoworld.com·
Why Kubernetes is winning the container war | InfoWorld
Programming Languages Influence Network 2014 | Exploring Data
Programming Languages Influence Network 2014 | Exploring Data
An interactive network graph showing the connections of programming languages based on their influences with language and language paradigm highlighting rendered with sigma.js and preprocessed with Gephi.
·exploringdata.github.io·
Programming Languages Influence Network 2014 | Exploring Data
The Curse of Knowledge
The Curse of Knowledge
“Uh, it’s off Airport Road. You should be able to get there from Umstead. I think or, or maybe go up to Estes?” I paused again. I was confusing the person asking me for directions more than I was c…
·m.signalvnoise.com·
The Curse of Knowledge
Stuck again – Signal v. Noise
Stuck again – Signal v. Noise
In 1949, Earl Bakken and his brother-in-law Palmer Hermundslie started a medical device repair shop in Palmer's garage. It was a terrible place to work – freezing in the winter, stifling in the summer. We used a garden hose to spray water on the roof in a not especially successful attemp…
·signalvnoise.com·
Stuck again – Signal v. Noise
Hashicorp Drives to Expand the Scope Beyond Developer Tools - The New Stack
Hashicorp Drives to Expand the Scope Beyond Developer Tools - The New Stack
The whole DevOps movement has been missing an important piece, according to HashiCorp, with too much emphasis on the tools and not enough on the overall workflows that require developers, operations and security teams to work together as part of an application delivery process. “[Releasing software faster] is more than just focusing on Agile and making…
·thenewstack.io·
Hashicorp Drives to Expand the Scope Beyond Developer Tools - The New Stack
Learn How To Do X With Y Using New Twilio Guides
Learn How To Do X With Y Using New Twilio Guides
As developers, we know there are two truths in making great software on this Internet: The answer is out there somewhere. We need it now. Today, we’re
·twilio.com·
Learn How To Do X With Y Using New Twilio Guides
Mapping the Disciplines of User Experience Design - Blog About Infographics and Data Visualization - Cool Infographics
Mapping the Disciplines of User Experience Design - Blog About Infographics and Data Visualization - Cool Infographics
Mapping the Disciplines of User Experience Design is an uber-complex Venn Diagram. The original concept by Dan Saffer at KickerStudio was given a clean DataViz overhaul by Thomas Gläser who was with  envis precisely  at the time. An infographic approach to visualize
·coolinfographics.com·
Mapping the Disciplines of User Experience Design - Blog About Infographics and Data Visualization - Cool Infographics
Let’s use Keystone! - O'Reilly Media
Let’s use Keystone! - O'Reilly Media
Use this instructional tutorial to interact with Keystone and invoke its core operational capabilities.
·oreilly.com·
Let’s use Keystone! - O'Reilly Media
Security architecture - O'Reilly Media
Security architecture - O'Reilly Media
Become familiar with various ways to design technical methods that minimize the risk of having a class of users who must be trusted—of their own volition—to behave within a set of rules in order to safeguard privacy.
·oreilly.com·
Security architecture - O'Reilly Media