A high school diploma is no longer enough for today’s manufacturing jobs. Enter the employer. Apprenticeships are making a comeback, complete with college.
The five simple things to remember when considering Trump’s motivations
Josh Marshall from Talking Points Memo urges us that when it comes to figuring out what Donald Trump's up to, we should keep it simple. The media has covered Trump for more than 30 years, he appeared weekly on television
The Megacity Economy: How Seven Types of Global Cities Stack Up
The world's largest 123 cities generate an astonishing $36 trillion in GDP per year. This infographic breaks these global cities down into seven typologies.
The problems started small, as they often do. But as we've seen many times before, lots of small problems in quick succession tend to make one big problem.
Small scale stream processing kata. Part 1: thread pools | NoBlogDefFound
Podcast for developers, testers, SREs… and their managers. I explain complex and convoluted technologies in a clear way, avoiding buzzwords and hype. Never longer than 4 minutes and 16 seconds.
PHP vs Python vs Ruby: Which Is Better? | Blog@PixelCrayons™
PHP vs Python vs Ruby Which is the best programming technology for web app development in the year 2020? This is one of the most debated questions among web programmers, students, and companies (wanted to develop their own website). Actually, every language has its own pros, cons or advantages, disadvantages. It totally depends on your requirements for website development. In this blog
APM Cookbook: Two-Factor Authentication using YubiKey OTP with iRulesLX.
It’s been a number of years since I penned my first DC article: Two-Factor Authentication using YubiKey, YubiCloud and APM. A lot has changed over the years, BIG-IP versions and features, new YubiKey models and the YubiCloud Validation...
And This Is Why Relying on Linux Makes Sense « ipSpace.net by @ioshints
Most networking operating systems include a mechanism to roll back device configuration and/or create configuration snapshots. These mechanisms usually work only for the device configuration, but do not include operating system images or other components (example: crypto keys). Now imagine using RFC 1925 rule 6a and changing the “configuration rollback” problem into “file system snapshot” problem. That’s exactly what Cumulus Linux does in its newest release. Does it make sense? It depends.
Why OSPF Needs Forwarding Address with NSSA Areas « ipSpace.net by @ioshints
In the previous blog posts I described how OSPF tries to solve some broken designs with Forwarding Address field in Type-5 LSA – a kludge that unnecessarily increases the already too-high complexity of OSPF. NSSA areas make the whole thing worse: OSPF needs Forwarding Address in Type-5 LSAs generated from Type-7 LSAs to ensure optimal packet forwarding. Here’s why:
Detroit’s Pattern of Growth: Four Key Factors Explain Motor City's Conflicted Grid - 99% Invisible
American cities tend to follow grid systems, and yet these grids also regularly deviate from predictable patterns in ways that can seem inexplicable at times. In places like Detroit, one can begin to unpack such complexities and contradictions by examining critical moments in the history of a place. In turn, understanding the development of one city can
A New Twist On Adding Data Persistence To Containers
Containers continue to gain momentum as organizations look for greater efficiencies and lower costs to run distributed applications in their increasingly