Tech Promises That Are Still Undelivered
Unsorted Bookmarks
Locking Down an SSH Server
If your host is connected to the Internet, it's likely under attack. Not theoretically... right now. Short of disallowing remote access entirely, it's wise to secure your SSH server.
Why Kubernetes is winning the container war | InfoWorld
It's all about knowing how to build an open source community -- plus experience running applications in Linux containers, which Google invented
Infographics: Operation Costs in CPU Clock Cycles - IT Hare on Soft.ware
Infographics: operation cost in cycles (from
MYSYM — a phone design to make you question all others – Medium
“MYSYM — a phone design to make you question all others” is published by Leo.
TEONITE | Fixing Python SOAP handling by using XML and JSONB fields in PostgreSQL
From Demagogues to Mental Fog - the Side Effects of the Information Age | Big Think
Rabble-rousing politicians may be uniquely benefitting from the Information Age.
Programming Languages Influence Network 2014 | Exploring Data
An interactive network graph showing the connections of programming languages based on their influences with language and language paradigm highlighting rendered with sigma.js and preprocessed with Gephi.
‘Created’ in China: Shenzhen is making hardware like Silicon Valley makes apps | Fusion
Ted Nelson, featured in Werner Herzog's "Lo and Behold," says the construction of the web is crippling our thinking — Quartz
“Being able to see visible connections between pages seems to me absolutely fundamental.”
Dstat – Versatile resource statistics tool | Ubuntu Geek
DAG: Dstat: Versatile resource statistics tool
Adafruit's new subscription boxes for makers and hackers / Boing Boing
Phil from Adafruit sez, “Adafruit released and shipped one of the only maker/hacker subscription boxes.”
Joining Hands and Singing Merrily Part 5
Why Innovation Is Driven by Your Company's Culture
Sarah Prevette, founder of Future Design School, describes one key method for inspiring creativity in your business.
Everything I Brought With Me on a 1,200-Mile River Canoe Trip | Motherboard
The Curse of Knowledge
“Uh, it’s off Airport Road. You should be able to get there from Umstead. I think or, or maybe go up to Estes?” I paused again. I was confusing the person asking me for directions more than I was c…
Stuck again – Signal v. Noise
In 1949, Earl Bakken and his brother-in-law Palmer Hermundslie started a medical device repair shop in Palmer's garage. It was a terrible place to work – freezing in the winter, stifling in the summer. We used a garden hose to spray water on the roof in a not especially successful attemp…
NoSQL Meets Bitcoin and Brings Down Two Exchanges: The Story of Flexcoin and Poloniex
The real story of how weak NoSQL systems allowed users to make money out of the thin air and brought down two Bitcoin exchanges, one permanently.
Hashicorp Drives to Expand the Scope Beyond Developer Tools - The New Stack
The whole DevOps movement has been missing an important piece, according to HashiCorp, with too much emphasis on the tools and not enough on the overall workflows that require developers, operations and security teams to work together as part of an application delivery process. “[Releasing software faster] is more than just focusing on Agile and making…
sean cassidy : Sherlock Holmes Debugging
Learn How To Do X With Y Using New Twilio Guides
As developers, we know there are two truths in making great software on this Internet: The answer is out there somewhere. We need it now. Today, we’re
This map of London's tube shows disused stations, track layout and more | CityMetric
It’s a scary, scary world out there. Looming crisis in North Korea. Donald Trump gaining in the polls. David Cameron leaving us all alone. So what you need,
Mapping the Disciplines of User Experience Design - Blog About Infographics and Data Visualization - Cool Infographics
Mapping the Disciplines of User Experience Design is an uber-complex Venn Diagram. The original concept by Dan Saffer at KickerStudio was given a clean DataViz overhaul by Thomas Gläser who was with envis precisely at the time. An infographic approach to visualize
Let’s use Keystone! - O'Reilly Media
Use this instructional tutorial to interact with Keystone and invoke its core operational capabilities.
Security architecture - O'Reilly Media
Become familiar with various ways to design technical methods that minimize the risk of having a class of users who must be trusted—of their own volition—to behave within a set of rules in order to safeguard privacy.
Data Structures: A high level overview of what they are and why we need them – Com Sci U
The Clean Architecture | 8th Light
Practical Event Sourcing And CQRS Benefits – Sapiens Works – Maintainable code is a business advantage
In-depth technical articles for developers who want to deliver more business value
Introducing the Programmer's Guide to a Sane Workweek · Code Without Rules
This post used to contain an early version of the introduction to my previous book, The Programmer’s Guide to a Sane Workweek. I’m now working on an updated iteration.