Builders make large data objects simpler to create, read, and maintain, and they are a great way to maintain immutable data objects and give default values. This is probably the most-important patt…
Microsoft upends traditional password recommendations with significant new guidance - Semperis
We protect the world’s largest and most complex environments from cyberattacks, data breaches, and operational errors. Read our recent post "Microsoft upends traditional password recommendations with significant new guidance" to learn more.
How much can you rely on the frameworks, tools and libraries you build your software on? And what can you do to reduce the inherent risk of depending on someone else’s software? Years ago I watched a whole software ecosystem die. Not the slow decline of a programming language that is losing its users, or a no longer maintained library that has a newer, incompatible replacement. This was perma-death: game over, no resurrection, no second chances. Here’s what happened, and what you can learn from it.
Event sourced domain objects in less than 150 LOC - Arkency Blog
Event sourced domain objects in less than 150 LOC Some say: “Event sourcing is hard”. Some say: “You need a framework to use Event Sourcing”. Some say: … Meh. You aren’t gonna need it.
PIR-triggered Staircase Lighting – with @IFTTT IoT Integration | #IoTuesday « Adafruit Industries – Makers, hackers, artists, designers and engineers!
These stairs look pretty great! I like the idea of walking through the house without having to press a button to switch on the lights. I wanted to have something like this on our staircase, also ha…
5 software development trends shaping enterprise in 2017 - O'Reilly Media
Open source development, changing infrastructure, machine learning, and customer-first design meet in a perfect storm to shape the next massive digital transformation.
The blockchain, game theory, float tanks, turmeric, Justin Trudeau, Joi Ito, dal fry, thermite, the Corbomite Maneuver… these are all notions (people, ideas, technologies, foods) that you may…
This Selenium with Ruby training tutorial explains how to install Selenium through Gems, start writing Selenium code in IDE and a full test automation case.
What should you log in an application and how to avoid having 24×7 support looking at them? | cloudncode
Sounds simple, but not necessarily done correctly always. In this article I will talk about the following (try not to skip stuff): What should be in every log line What should you be logging at a h…
A review of Hubbard and Siersen's _How to Measure Anything in Cybersecurity Risk_, which busts myths and opens doors to better information risk management.
I’m learning to code at 56. Here’s an epic beat-down of my critical inner self.
by VM Vaughn I’m learning to code at 56. Here’s an epic beat-down of my critical inner self.I’m 56 years old and learning to code. Why? Because I love it. And I’ve got a knack for it. That doesn’t mean it’s easy. It’
Scientists turn memory chips into processors to speed up computing tasks -- ScienceDaily
A team of international scientists has found a way to make memory chips perform computing tasks. The advance means data could now be processed in the same spot where it is stored, leading to much faster and thinner mobile devices and computers.
GitHub - wireservice/proof: A Python library for creating fast, repeatable and self-documenting data analysis pipelines.
A Python library for creating fast, repeatable and self-documenting data analysis pipelines. - GitHub - wireservice/proof: A Python library for creating fast, repeatable and self-documenting data a...