Ask programmers what comes to mind when you say concurrency and most are likely to say threads. Ask what comes to mind when you say threads and most are likely to say locks or synchronisation.These assumptions are so deeply held that they define and constrain how programmers are taught and think aboinfosec.mozilla.org
The goal of this document is to help operational teams with the configuration of OpenSSH server and client. All Mozilla sites and deployment should follow the recommendations below. The Enterprise Information Security (Infosec) team maintains this document as a reference guide.Mapping the whole internet with Hilbert curves
The internet is big. Really big. You just won’t believe how vastly, hugely, mind-bogglingly big it is. I mean, you may think the /22 you got as a LIR was big, but that’s just peanuts to the internet. Well, actually, it wasn’t in the long run, that’s why we need IPv6.Enterprise Programming Tricks For Clean Code
It is all too easy to dismiss problematic codebases on some nebulous idea of bad practice or bad programmers. Poor code, however, is rarely arbitrary and random in its structure or formulation. Systems of code, well or poorly structured, emerge from systems of practice, whether effective or ineffectWhat We Talk About When We Talk About Performance
Describing performance improvements exists at the intersection of mathematics and linguistics. It is quite common to use incorrect math to describe performance improvements, and it is possible to use incorrect, misleading, or just sub-optimal rhetoric to describe your math. AirTrain Inc.To Close Or Not To Close
Have you ever wondered if it’s better to “close” a br or input tag like <br /> or if it’s better to just write <br> in HTML5? Or why it’s not correct to write <script src="script.The art of the error message
The concept of “embracing failure” is big in the tech industry. Fail fast, fail often! is almost an industry mantra. But there’s an everyday type of failure that doesn’t get much attention in the product development process. That’s right. The humble error message.I’m harvesting credit card numbers and passwords from your site. Here’s how.
The following is a true story. Or maybe it’s just based on a true story. Perhaps it’s not true at all. It’s been a frantic week of security scares?—?it seems like every day there’s a new vulnerability.The Polly Project
Today we released Polly v5.0 in alpha to Nuget. This is the next step in making Polly a much wider resilience framework for .NET, as Hystrix is for Java. This is an exciting day for us, and one we've been working toward for several months. Not only have we pushed out a major release (v5.Resilient Systems with Polly.NET
General Probably most of the Web sites and Applications we use or visit today are of a distributed nature and running highly complex infrastructure and using sophisticated Software Design patterns for the Cloud along with factors that can lead to difficulties and failure.
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.