Jigsaw | Phishing Quiz
Zidentyfikowanie wyłudzenia informacji może być trudniejsze, niż przypuszczasz. Phishing polega na tym, że ktoś podający się za kogoś znajomego próbuje Cię oszukać, by poznać Twoje dane osobowe. Czy potrafisz wskazać, co jest oszustwem?
phising  quiz  security  test 
8 days ago
Podman and Buildah for Docker users - Red Hat Developer
how Docker users move from Docker to Podman and Buildah. Also what role does Buildah play? Is Podman deficient in some way that we need both Podman and Buildah to replace Docker?

This article answers those questions and shows how to migrate to Podman.
docker  containers  podman  kubernetes  introduction 
18 days ago
Game of Trees
Game of Trees (Got) is a version control system which prioritizes ease of use and simplicity over flexibility.

Got uses Git repositories to store versioned data. At present, Got supports local version control operations only.
git-frontend  git-alternative  version-control  bsd  gui 
28 days ago
Google admits those infamous brainteasers were completely useless for hiring — Quartz
Google has admitted that the headscratching questions it once used to quiz job applicants (How many piano tuners are there in the entire world? Why are manhole covers round?) were utterly useless as a predictor of who will be a good employee. (…) “They don’t predict anything. They serve primarily to make the interviewer feel smart.”
employment  career  google  hiring  smart-questions  @share 
7 weeks ago
Simplify Jenkins Slave Agents Setup in OpenShift - Dale Bingham - Medium
I want to share how I am using Config Maps in my OpenShift deployment templates to quickly and easily add Jenkins Slave Agents for your Jenkinsfile Pipeline.
openshift  jenkins  slave  configuration  custom-image 
7 weeks ago
SymPy makes math fun again
Mathematics is a lot of things. It's fun of problem-solving, it's an excitement of discoveries, it's a pride of accomplishments, and it's a ton of tedious computations, too. I never liked the last part. Couldn't make it right. That's why I'm so happy to live in the XXI century since I can give it away to computers and still enjoy the first three.
sympy  python  tutorial  introduction  @share 
8 weeks ago
Will Facebook’s Libra Turn into a Cancer? by Andrés Velasco, Roberto Chang and Roberto Chang - Project Syndicate
Argentina’s failed policy, known as a currency board, is exactly what Facebook is trying to create with Libra, except that Libra would be pegged to a basket of major currencies, not just to the dollar. Currency boards have been tried at different times and places, and the many lessons we have learned about them apply to Libra.
libra  currency  risks  finances  crypto-currency 
9 weeks ago
User Inyerface - A worst-practice UI experiment
Hi and welcome to User Inyerface,
a challenging exploration of
user interactions and design patterns.

To play the game, simply fill in the form
as fast and accurate as possible.
funny  ux  web  ui  anti-patterns  game  @share 
10 weeks ago
Podman | podman.io
Podman is a daemonless container engine for developing, managing, and running OCI Containers on your Linux System. Containers can either be run as root or in rootless mode. Simply put: `alias docker=podman`. More details here.
container  docker-alternative  docker 
12 weeks ago
Introducing the Red Hat Universal Base Image
With the release of the Red Hat Universal Base Image (UBI), you can now take advantage of the greater reliability, security, and performance of official Red Hat container images where OCI-compliant Linux containers run - whether you’re a customer or not. This means you can build a containerized application on UBI, push it to a container registry server of your choosing, and share it. The Red Hat Universal Base Image can allow you to build, share and collaborate on your containerized application where you want.
redhat  docker  container 
12 weeks ago
coreos/clair: Vulnerability Static Analysis for Containers
Clair is an open source project for the static analysis of vulnerabilities in application containers (currently including appc and docker).

In regular intervals, Clair ingests vulnerability metadata from a configured set of sources and stores it in the database.
Clients use the Clair API to index their container images; this creates a list of features present in the image and stores them in the database.
Clients use the Clair API to query the database for vulnerabilities of a particular image; correlating vulnerabilities and features is done for each request, avoiding the need to rescan images.
When updates to vulnerability metadata occur, a notification can be sent to alert systems that a change has occured.

Our goal is to enable a more transparent view of the security of container-based infrastructure. Thus, the project was named Clair after the French term which translates to clear, bright, transparent.
docker  containers  lint  security-check 
12 weeks ago
The Universe of Discourse : Alphabetical order in Korean
ㅎis the last letter of the alphabet. Because ㅎfollows ㄴ, you might think that 무해 would follow 문어. But it does not. In Korean, alphabetization is also done at the syllable level. The syllable 무 comes before 문, because it is a proper prefix, so 무해 comes before 문어. If the syllable break in 문어 were different, causing it to be spelled 무너, it would indeed come before 무해. But it isn't, so it doesn't
alphabetic-order  korean  sorting  international  difficult 
june 2019
SPIFFE – Secure Production Identity Framework for Everyone
SPIFFE, the Secure Production Identity Framework for Everyone, is a set of open-source standards for securely identifying software systems in dynamic and heterogeneous environments. Systems that adopt SPIFFE can easily and reliably mutually authenticate wherever they are running.
security  dev-ops  inter-process  middleware  authorization  api-authorization 
june 2019
NGINX Unit: A Modern App Server for Modern Apps - NGINX
NGINX Unit dramatically reduces the burden of managing multiple app servers. It currently supports seven languages – Go, Node.js, Perl, PHP, Python, Ruby, and Java Servlet Containers (the last as an experimental module). You can run applications written in different languages on the same server. Furthermore, app versions written in different versions of a language (PHP 5 and PHP 7, Python 2.7 and Python 3) run side by side on the same server.
nginx  nunit  app-server  perl-server  python-server  nodejs-server  go-server  ruby-server  php-server 
june 2019
Is High Quality Software Worth the Cost?
This is what happens with poor internal quality. Progress is rapid initially, but as time goes on it gets harder to add new features. Even small changes require programmers to understand large areas of code, code that's difficult to understand. When they make changes, unexpected breakages occur, leading to long test times and defects that need to be fixed.

Concentrating on high internal quality is about reducing that drop off in productivity. Indeed some products see an opposite effect, where developers can accelerate as new features can be easily built by making use of prior work. This happy situation is a rarer case, as it requires a skilled and disciplined team to make it happen. But we do occasionally see it.
martin-fowler  quality  technical-debt  analysis  complexity 
june 2019
From Templates to Openshift Helm Charts – Red Hat OpenShift Blog
We have proven it is fairly easy to move from OpenShift Templates to Helm Charts. This is a good sign for general interchangeability between differing mechanisms in OpenShift and efforts in stock Kubernetes and the wider community.
openshift-template  helm-chart  conversion  differences 
june 2019
Develop and test your cloud apps offline.
development  cloud  aws  local 
june 2019
GitHub - google/gvisor: Container Runtime Sandbox
gVisor is a user-space kernel for containers. It limits the host kernel surface accessible to the application while still giving the application access to all the features it expects. Unlike most kernels, gVisor does not assume or require a fixed set of physical resources; instead, it leverages existing host kernel functionality and runs as a normal user-space process. In other words, gVisor implements Linux by way of Linux.
container  security  docker  kubernetes  gvisor 
june 2019
The Filter Bubble is Actually a Decision Bubble - Baekdal Plus
Being in a filter bubble means that you are somehow only exposed to one set of information, but that's not what is happening here. If you actually measure how much information people are exposed to, you will immediately see that the public are exposed to more viewpoints than ever before. This is the opposite of a filter bubble.
journalism  baekdal  @share  filter-bubble  opinions  fake-news 
april 2019
In Defense of YAML
YAML as data format is defensible. YAML as a programming language is not. If you're programming, use a programming language. You owe it to Turing, Hopper, Djikstra and the countless other computer scientists and practitioners who've built our discipline. And you owe it to yourself.
yaml  anti-patterns  programming  dsl  @share 
march 2019
WebAIM: History of the browser user-agent string
In the beginning there was NCSA Mosaic, and Mosaic called itself NCSA_Mosaic/2.0 (Windows 3.1), and Mosaic displayed pictures along with text, and there was much rejoicing.
user-agent  browser  history  humor  @share 
march 2019
Falsehoods Programmers Believe About Names | Kalzumeus Software
I have never seen a computer system which handles names properly and doubt one exists, anywhere
falsehood  name  validation  names  nazwiska  funny  @share 
march 2019
An easy to use, distributed and fast version control system.
version-control  distributed  vcs 
march 2019
Technical Debt – Bad metaphor or worst metaphor?
Once we slack (back off on quality for tactical reasons), we’ll never quite recover.
Yes. I hold that once we slack on quality, we’ll never get it all the way back. We’ll be slower forever by some amount.
quality  testing  development  @share 
march 2019
Incremental Development
The story of Big Design is that we have some carefully examined set of perfect requirements, and that we create, using some fairly formal method, a beautiful design for implementing those requirements. That design, shining like a golden sun, illuminates the programming world, so that the programmers can, more or less without deep thought, build the perfect implementation of our perfect design for those perfect requirements.

Even if this were true – spoiler alert: it is not – Big Design wouldn’t meet our needs in many cases. I would say it doesn’t meet our needs in any cases, but it certainly doesn’t meet our needs in the case I care about: Working Software.
design  programming  big-design  development 
march 2019
Stop using JWT for sessions - joepie91's Ramblings
"It uses cryptography" doesn't magically make something more secure either; it must serve a specific purpose, and be an effective solution for that specific purpose. Incorrectly used cryptography can, in fact, make something less secure.
sessions  cookies  securitym  json-web-tokens  bad-crypto 
september 2018
Basics of Futexes - Eli Bendersky's website
The futex (short for "Fast userspace mutex") mechanism was proposed by Linux contributors from IBM in 2002 [1]; it was integrated into the kernel in late 2003. The main idea is to enable a more efficient way for userspace code to synchronize multiple threads, with minimal kernel involvement.

In this post I want to provide a basic overview of futexes, how they work, and how they're used to implement the more familiar synchronization primitives in higher-level APIs and languages.
locking  linux  kernel  synchronization  futex 
august 2018
mnot’s blog: How to Read an RFC
For better or worse, Requests for Comments (RFCs) are how we specify many protocols on the Internet. These documents are alternatively treated as holy texts by developers who parse them for hidden meanings, then shunned as irrelevant because they can’t be understood. This often leads to frustration and – more significantly – interoperability and security issues.

However, with some insight into how they’re constructed and published, it’s a bit easier to understand what you’re looking at. Here’s my take, informed from my experiences with HTTP and a few other things.
rfc  guide  ietf 
august 2018
From Switch Statement Down to Machine Code - Vlad Lazarenko
Not many developers understand switch statements down to the machine code level and even less have checked what their compilers do. By the way, why cannot a compiler optimize an if-then-else code the same way it optimizes a switch? Maybe it can? Let’s find out!
c++  compiler  switch  programming 
august 2018
Developers Should Abandon Agile
No matter what framework or method your management thinks they are applying, learn to work this way:

Produce running, tested, working, integrated software every two weeks, every week. Build your skills until you can create a new fully operational version every day, twice a day, multiple times a day.
Keep the design of that software clean. As it grows, the design will tend to become complex and crufty. Resist and reverse this tendency consciously, refactoring in tiny continuous steps, all the time, so that your rate of progress is as steady and consistent as possible.
Use the current increment of software as the foundation for all your conversations with your product leadership and management. Speak in terms of what’s ready to go, and in terms of what they’d like you to do next.
agile  scrum  critique  project-management 
june 2018
« earlier      
@share agile ajax algorithm algorithms amazon analysis analytics android api apple architecture article artykuł automation backup bash benchmark blog blogging book books boost browser build business c c++ chess chrome client cloud cluster cms code collaboration community comparison concurrency configuration console critique css css3 database debian deployment design desktop development distributed django documentation download dzieci ebook ebooks eclipse editor emacs email engine epub erlang example extension facebook fics firefox flickr fonts forum framework free functional git gnome go google graphics gtd gui haskell historia history hosting howto html html5 humor ide image imported innovation internet iphone java javascript jquery katastrofa komiks krytyka language latex learning library linux logging mac management marketing matematyka math mathematics meble media memory mercurial microsoft mleczko mobile monitoring mozilla mysql nauka network news nginx non-sql notes online open-source opensource optimization oracle parsing pdf people performance perl php plugin polityka polska polskie postgresql ppa praca prawo presentation privacy problems productivity programming programowanie project-management projectmanagement psychology publishing pylons python reader reference replication review rss ruby scala scalability search security seo server shell sklep smolensk social social-media software sql ssh startup statistics storage sysadmin szachy testing text tips todolist tools tutorial twisted twitter typography ubuntu unit-testing usability ux video visualization warszawa web web2.0 webdesign webdev wiki windows writing wsgi wywiad xml yahoo youtube

Copy this bookmark: