Customize your SCUF | Scuf Gaming
Unsorted Bookmarks
I Learned Coding Mostly From Porn – Coding To Freedom
PLASTICITY 公式サイト | ビニール傘を再利用するサスティナブル バッグ ブランド。
PLASTICITY(プラスティシティ)は捨てられたビニール傘を再利用したプロダクトを提供するブランドです。独自の方法で何層にも重ねたプラスチックが、高品質なトートバッグやショルダーバッグに生まれ変わります。持続可能・リサイクル・サスティナブル バッグ・サステナブル・SDGs・齊藤明希・当日発送・5000円以上送料無料
Gallery — Mikko Lagerstedt
Container Platforms, Open Source and Changing Infrastructure's Impact on the OpenStack Ecosystem - The New Stack
In this episode of The New Stack Makers, we explore how OpenStack is being put to use in containerized environments, open source projects currently shaping the ecosystem, and how the changes surrounding infrastructure have shaped OpenStack. The New Stack founder Alex Williams and co-host SolarWinds Cloud & Container Technology Leader Lee Calcote sat down for…
What VRM is about – ProjectVRM
ProjectVRM fosters development of tools and services that make every person both independent of others (especially companies), yet better able to engage with them. There are a lot of developers doi…
Battling Encodings - Part 1
My programming blog, where i write about thoughts and ideas that rise during work.
What Programming's Past Reveals About Today's Gender-Pay Gap - The Atlantic
When men enter a female-heavy field, perceptions of women don’t improve—perceptions of the job do.
Assessing the Current State of Container Security - The New Stack
Any rational organization that wishes to run mission-critical services on containers will at some point ask the question: "But is it secure? Can we really trust containers with our data and applications?" Amongst tech folks, this often leads to a containers versus virtual machines (VMs) debate and a discussion of the protection provided by the…
Scalable and secure access with SSH | Engineering Blog | Facebook Code | Facebook
Consistent security controls and high reliability are common expectations for any systems administrator. How do you deliver both on a network with thousands of servers supporting thousands of engineers? Most off-the-shelf solutions require a compromise in at least one of these areas — and we refused to accept this. Most systems administrators use the industry-standard [...]Read More...
A Web Application Vulnerabilities Hierarchy
UnifyID wants to bury the password once and for all | TechCrunch
The old-fashioned password gets little respect from hackers these days. In fact, it's barely a speed bump for them to get past. The hacker can find your password or even the answers to your "security" questions for sale on the internet black market. UnifyID, a participant in this year's TechCrunch Disrupt SF Battlefield competition, sees a system that's hopelessly broken -- and they think they have a way to fix it.
On the Secret Life of Things – Familiar objects, new behaviours / @och_nee
Why you should build your own NoSQL database
NVIDIA Announces Tesla P40 & Tesla P4 - Neural Network Inference, Big & Small
Over the last few months we have seen NVIDIA’s Pascal GPUs roll out among their consumer cards, and now the time has come for...
Data Visualization Made Easy With Contour.js – Runtimerror
ISP Column - September 2016
Enough with "firewalls" - 'net work
The Anatomy of Innovation: Why so Many Small Startups Manage to Out-Innovate Large Enterprises - Mokriya BlogMokriya Blog
A digital product engineering leader, Nagarro drives technology-led business breakthroughs for industry leaders and challengers through agility and innovation.
Someone Is Learning How to Take Down the Internet - Lawfare
Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely calibrated attacks designed to
RFC 7567 - IETF Recommendations Regarding Active Queue Management
IETF Recommendations Regarding Active Queue Management (RFC )
Seth's Blog: A value creation checklist
This project you’re working on, the new business or offering, what sort of value does it create? Who is it for? What mindset and worldview and situation?Is it paid for by organizations or individua…
When "computers" were young, brilliant black women mathematicians / Boing Boing
Margot Lee Shetterly’s Hidden Figures recovers the lost history of the young African American women who did the heavy computational work of the Apollo missions, given the job title of “…
Container Networking: A Breakdown, Explanation and Analysis - The New Stack
While many gravitate toward network overlays as a popular approach to addressing container networking across hosts, the functions and types of container networking vary greatly and are worth better understanding as you consider the right type for your environment. Some types are container engine-agnostic, and others are locked into a specific vendor or engine. Some…
Kentik Is a Data Engine Modeled after Google Dremel - The New Stack
San Francisco-based startup Kentik takes a big data approach to network traffic intelligence in a SaaS model for companies such as Box, Dailymotion and Yelp. It relies on what it calls its “post-Hadoop big data engine,” to offer sub-minute response to simultaneous queries from multiple users on billions of records to provide insight into network…
Telemetry: What It Is, What It Isn't, and Why It's Important in Distributed Systems - The New Stack
In this episode of The New Stack Makers, we learn about the nuances behind software-defined infrastructure, how new approaches to telemetry are changing the way users interact with their data and the ways that distributed analytics can be put into practice in the enterprise. The New Stack founder Alex Williams spoke with Intel Software-Defined Infrastructure (SDI)…
Why Enterprises Are Embracing Microservices and Node.js - The New Stack
Most software projects start with solving one problem. Then comes another one and the project continues growing without the engineering team being able to cope with it. This is how monoliths are built. Every new feature gets added to the existing application making it more and more complex. Scaling becomes hard and resource-wasting since everything…
The Five Principles of Monitoring Microservices - The New Stack
The need for microservices can be summed up in just one word: speed. The need to deliver more functionality and reliability faster has revolutionized the way developers create software. Not surprisingly, this change has caused ripple effects within software management, including monitoring systems. In this post, we’ll focus on the radical changes required to monitor…
Engineers propose a technology to break the net neutrality deadlock
Stanford engineers have invented a technology that would allow an internet user to tell network providers and online publishers when and if they want content or services to be given preferential delivery, ...
UnifyID and Continuous Authentication
So I was just watching the pitches for the six Disrupt finalists, and there were a couple that had The Glow for me. First, was Carbon Health, which is