How to Work Hard

all things engineering
Why Tailwind Isn't for Me
I think the folks building Tailwind are talented and nice people. But at a pure technical level, I simply don't like Tailwind. Whoever it was built for, it was not built for me.
"Performance Matters" by Emery Berger
Performance clearly matters to users. For example, the most common software update on the AppStore is "Bug fixes and performance enhancements." Now that Moore's Law has ended, programmers have to work hard to get high performance for their applications. But why is performance hard to deliver? I will first explain why current approaches to evaluating and optimizing performance don't work, especially on modern hardware and for modern applications. I then present two systems that address these challenges. Stabilizer is a tool that enables statistically sound performance evaluation, making it p...
Chamath Palihapitiya - how we put Facebook on the path to 1 billion users
We Hacked Apple for 3 Months: Here’s What We Found
JavaScript Engines: The Good Parts™ - Mathias Bynens & Benedikt Meurer - JSConf EU 2018
Blog post: https://mathiasbynens.be/notes/shapes-ics JavaScript has definitely been among the most influential technologies for almost a decade now. A lot of this is due to the sophisticated JavaScript VMs in modern browsers, Node.js and Electron. In this talk we’re going to explore important ingredients of these modern JavaScript VMs, specifically how ChakraCore, the engine that powers Microsoft Edge, and V8, the engine that powers Google Chrome, compare to each other for certain key features. OMG JSConf EU is coming back in 2019 https://2019.jsconf.eu/
"Cruddy by Design" - Adam Wathan - Laracon US 2017
Thanks to Streamacon for filming! Source code from the presentation can be found here: https://github.com/adamwathan/laracon2017
Lexical Scanning in Go - Rob Pike
Lexical Scanning in Go, a talk by Rob Pike at Google Technology User Group given on Tuesday, 30 August 2011. The slides: http://rspace.googlecode.com/hg/slid...
Hackers Take Over Apple, Uber, Prominent Crypto Twitter Accounts in Simultaneous Attack
Hackers pumping a crypto giveaway scam appear to have compromised the Twitter accounts of leading exchanges, individuals and at least one news org.
You've only added two lines - why did that take two days!
It might seem a reasonable question, but it makes some terrible assumptions: lines of code = effort lines of code = value all lines of c...
New Governance for Redis
Redis open source project leaders Yossi Gottlieb and Oran Arga share the new community-driven governance structure for how Redis will be managed going forward.
Update on IT Security Incident at UCSF
UCSF IT staff detected a security incident that occurred in a limited part of the UCSF School of Medicine’s IT environment on June 1.
Earning $800 / Month With Spotify
I'm making over $800 per month with my music— almost exclusively through Spotify. This up from $400 per month last year. I don't tour, I don't sell merch and I'm not on a major label. I'm just a small indie artist making music in my evenings— and Spotify is making that possible.
Do Not Follow JavaScript Trends
What to do before adopting every little trend you come across
Container technologies at Coinbase
Why Kubernetes is not part of our stack
10X thinking: The Growth Story of Giphy by the Founder Alex Chung
Everything you need to know about exponential growth presented candidly by two experts on the subject. Alex Chung, Founder of GIPHY, and Paul Murphy, Partner...
5 Types Of ZSH Aliases You Should Know
In ZSH you can increase your productivity with aliases. This post explains 5 types of aliases that you should know. Boost your shell productivity now and make ZSH your own
The good parts of AWS - A visual summary
A summary of Daniel Vassallo and Josh Pschorr Ebook. Find out about the secrets of DynamoDB, S3, EC2, Lambda and others. A Guide for AWS DevOps enthusiasts.
How To Invest In Startups
There is a lot of advice about how to be a good startup founder. But there isn’t very much about how to be a good startup investor. Before going any further, I should point out that this is a...
Goodbye, Clean Code
Let clean code guide you. Then let it go.
The TypeScript Tax
A Cost vs Benefit Analysis
Tobi Lutke 🌳🌲 on Twitter
I realize everyone's twitter feed looks different. But I'll go ahead and subtweet two conversations that I see going by right now: a) How the heck did Shopify get so big this decade and b) You have to work 80 hours a week to be successful. Thread/— Tobi Lutke 🌳🌲 (@tobi) December 26, 2019
Sizzy - The Responsive Design Browser
Made for designers and developers. Make your life easier and instantly preview your website across multiple devices.
Vikrum Nijjar: Engineer #1 at Firebase and Founder of Gold Fig Labs (YC S19)
Vikrum Nijjar joined as the first engineer at Firebase, and did whatever it took to help the company succeed: scaling out infrastructure, shipping mobile SDKs, hosting 1-1 office hours with developers and even standing in as SRE for 24x7 hour shifts... for over a year. In this interview, Vikrum tel
How I Created A $60K/Month App That Collects In-Person Payments Through Stripe - Starter Story
I’m Ryan Scherf, the founder of payment.co (@payment), an app built on top of the Stripe payment gateway for creating card-present charges. Payment is available on iOS and Android, and allows customers who have created online stores to easily collect payments in person, in the same acco...
The Project Jengo Saga: How Cloudflare Stood up to a Patent Troll – and Won!
We don’t plan to settle, and if brought into such litigation again in the future, we think we have a pretty good blueprint for how to respond.
Jonathan Blow - Preventing the Collapse of Civilization (English only)
Jonathan's talk from DevGAMM 2019.
Node.js: How even quick async functions can block the Event-Loop, starve I/O | Snyk Engineering
Yet another article about the Node.js Event-Loop
NordVPN confirms it was hacked
NordVPN, a virtual private network provider that promises to “protect your privacy online,” has confirmed it was hacked. The admission comes following rumors that the company had been breached. It first emerged that NordVPN had an expired internal private key exposed, potentially allowing anyone to spin out their own servers imitating NordVPN. VPN providers are […]
A Senior Engineer's CheckList
Checklist for success of a senior engineer