Cory Doctorow fields questions on the future of the web, privacy, and net neutrality. Continue reading Question and answer session with Cory Doctorow.
Tamar Bercovici details how the team at Box has constructed its database stack to handle an ever-growing query load and data set. Continue reading Lessons learned while evolving Box’s database infrastructure.
Scott Davis explains why accessibility should be just as important to you as a mobile design strategy was 10 years ago. Continue reading It's spelled "accessibility," not "disability".
Martin Woodward shares key data points from Microsoft's journey to DevOps. Continue reading Why Microsoft does DevOps.
Lin Clark explains what browser vendors need to do over the next few years to ensure their browsers, and the web itself, meet upcoming demands. Continue reading The parallel future of the browser.
Kyle York explores the scale, complexity, and volatility of the internet and the risk it poses to your applications and infrastructure. Continue reading The internet vs. your sites: Taking action against internet volatility.
Cherie Wong shares common developer pain points and recipes to solve them using AWS. Continue reading What's cooking in the AWS kitchen? Recipes for a better web.
What's cooking in the AWS kitchen? Recipes for a better webCherie Wong shares common developer pain points and recipes to solve them using AWS.
The parallel future of the browserLin Clark explains what browser vendors need to do over the
Continue reading "Highlights from the O’Reilly Fluent Conference in San Jose 2018"
Renee Orser explains how to monitor the human networks within your engineering teams using models similar to your distributed technology systems. Continue reading Observability of team health: Deciphering and reacting to organizational feedback.
Astrid Atkinson discusses techniques for building systems that are resilient by design. Continue reading Reliability from the ground up: Designing for five nines.
Kris Nova looks at the four metrics that help you decide if running stateful applications in Kubernetes is worth the risk. Continue reading Running stateful applications in Kubernetes: Is it worth the risk.
Cory Doctorow says the right to configure technology is the signature right of the 21st century. Continue reading The freedom to configure is the freedom to make a better world.
Security Papers, Science AI, Deliberation, and Doing Science
- Influential Security Papers -- a ranking of top-cited papers from the area of computer security. The ranking is automatically created based on citations of papers published at top security conferences.
- Aristo -- Allen Institute app that reads, learns, and reasons about science.
- Automated Planning and Acting -- book and slides. This book is about methods and techniques that a computational agent can use for deliberative planning and acting, that is, for deciding both which actions to perform and how to perform them, to achieve some objective.
Notes on Everything is F*cked -- Sanjay Srivastava posted a syllabus for a course called Everything is Fucked. The course itself is intended as a joke, but the reading list seemed interesting. These notes on the reading list papers are a great romp through the reproducibility crisis, p-hacking, and the multiplicity of ways your science can Continue reading "Four short links: 13 June 2018"
A look at a few ways to evaluate whether or not a design achieves what it set out to do. Continue reading How to set goals and define success in design.
Practical advice for software engineers and security consultants. As a software security evaluator and a one-time engineer, I can confirm what the daily security breaches are telling us: software engineers and architects regularly fail at building in sufficient security and privacy. As someone who has been on both sides of this table, I’d like to share some of my own security-related engineering sins and provide some practical advice for both engineers and security officers on how best to balance development goals with privacy concerns. I started programming many years ago, working in a role where I created artificial intelligence software for data analysis. My team and I built innovative software solutions for predicting behavior, such as programs that could aid in preventing crimes. As enthusiastic engineers, we were so focused on building something cool and of great value that we tended to overlook the security risks in our programs, profoundly
Continue reading "How to balance development goals with security and privacy"
The benefits of modeling data as events as a mechanism to evolve our software systems. For as long as we’ve been talking about microservices, we’ve been talking about data. In fact, before we even had the word microservices in our lexicon, back when it was just good old-fashioned service-oriented architecture, we were talking about data: how to access it, where it lives, who “owns” it. Data is all-important—vital for the continued success of our businesses—but has also been seen as a massive constraint in how we design and evolve our systems. My own journey into microservices began with work I was doing to help organizations ship software more quickly. This meant a lot of time was spent on things like cycle time analysis, build pipeline design, test automation, and infrastructure automation. The advent of the cloud was a huge boon to the work we were doing, as the improved automation
Continue reading "Microservices, events, and upside-down databases"
How to identify when a fit has been achieved, and how to exit the explore stage and start exploiting a product with its identified market.
Evaluate the Product/Market Fit
The Edge…there is no honest way to explain it because the only people who really know where it is are the ones who have gone over it.In this chapter, we will discuss how to identify when a product/market fit has been achieved and how to exit the explore stage and start exploiting our product with its identified market. We’ll show how to use customized metrics to understand whether we are achieving measurable business outcomes while continuing to solve our customers’ problems by engaging them throughout our development process. We will cover how organizations set themselves up for success with the right strategy, structure, and support, and how they find internal and external customers to provide valuable feedback
Hunter S. Thompson
Continue reading "Evaluate a product/market fit"
Taking blockchain technology private for the enterprise. Blockchain technologies have been made popular by the creation of bitcoin, but how exactly can a blockchain benefit an enterprise? A blockchain provides an immutable store of facts. This model delivers significant value in the face of regulatory oversight by providing irrevocable proof that transactions occurred. Some even refer to these uses of a blockchain as enterprise resource planning (ERP) 2.0. The foundational pieces that comprise a blockchain model are already in place in one fashion or another within most enterprises. They have not, however, been pieced together with the required technology components to produce the benefits of a blockchain. There are three main components required to deliver these benefits: a shared distributed ledger, smart contracts, and consensus.
Shared distributed ledgerThis is really as simple as it sounds. The key detail of the ledger is that you cannot go back and
Continue reading "The blockchain beyond bitcoin"