Highlights from the O’Reilly Fluent Conference in San Jose 2018

Watch highlights covering JavaScript, accessibility, privacy, and more. From the O'Reilly Fluent Conference in San Jose 2018. Experts from across the web world came together for the O'Reilly Fluent Conference in San Jose. Below you'll find links to highlights from the event.

Fixing JavaScript Date: A journey from Minneapolis to Microsoft, TC39, and everywhere in between

Maggie Pint explains how bad date support in JavaScript took her from making HR software to working as an Azure SRE.

What's cooking in the AWS kitchen? Recipes for a better web

Cherie Wong shares common developer pain points and recipes to solve them using AWS.

The parallel future of the browser

Lin Clark explains what browser vendors need to do over the
Continue reading "Highlights from the O’Reilly Fluent Conference in San Jose 2018"

Four short links: 13 June 2018

Security Papers, Science AI, Deliberation, and Doing Science
  1. Influential Security Papers -- a ranking of top-cited papers from the area of computer security. The ranking is automatically created based on citations of papers published at top security conferences.
  2. Aristo -- Allen Institute app that reads, learns, and reasons about science.
  3. Automated Planning and Acting -- book and slides. This book is about methods and techniques that a computational agent can use for deliberative planning and acting, that is, for deciding both which actions to perform and how to perform them, to achieve some objective.
  4. Notes on Everything is F*cked -- Sanjay Srivastava posted a syllabus for a course called Everything is Fucked. The course itself is intended as a joke, but the reading list seemed interesting. These notes on the reading list papers are a great romp through the reproducibility crisis, p-hacking, and the multiplicity of ways your science can
    Continue reading "Four short links: 13 June 2018"

How to balance development goals with security and privacy

Practical advice for software engineers and security consultants. As a software security evaluator and a one-time engineer, I can confirm what the daily security breaches are telling us: software engineers and architects regularly fail at building in sufficient security and privacy. As someone who has been on both sides of this table, I’d like to share some of my own security-related engineering sins and provide some practical advice for both engineers and security officers on how best to balance development goals with privacy concerns. I started programming many years ago, working in a role where I created artificial intelligence software for data analysis. My team and I built innovative software solutions for predicting behavior, such as programs that could aid in preventing crimes. As enthusiastic engineers, we were so focused on building something cool and of great value that we tended to overlook the security risks in our programs, profoundly
Continue reading "How to balance development goals with security and privacy"

Microservices, events, and upside-down databases

The benefits of modeling data as events as a mechanism to evolve our software systems. For as long as we’ve been talking about microservices, we’ve been talking about data. In fact, before we even had the word microservices in our lexicon, back when it was just good old-fashioned service-oriented architecture, we were talking about data: how to access it, where it lives, who “owns” it. Data is all-important—vital for the continued success of our businesses—but has also been seen as a massive constraint in how we design and evolve our systems. My own journey into microservices began with work I was doing to help organizations ship software more quickly. This meant a lot of time was spent on things like cycle time analysis, build pipeline design, test automation, and infrastructure automation. The advent of the cloud was a huge boon to the work we were doing, as the improved automation
Continue reading "Microservices, events, and upside-down databases"

Evaluate a product/market fit

How to identify when a fit has been achieved, and how to exit the explore stage and start exploiting a product with its identified market.

Evaluate the Product/Market Fit

The Edge…there is no honest way to explain it because the only people who really know where it is are the ones who have gone over it.

Hunter S. Thompson

In this chapter, we will discuss how to identify when a product/market fit has been achieved and how to exit the explore stage and start exploiting our product with its identified market. We’ll show how to use customized metrics to understand whether we are achieving measurable business outcomes while continuing to solve our customers’ problems by engaging them throughout our development process. We will cover how organizations set themselves up for success with the right strategy, structure, and support, and how they find internal and external customers to provide valuable feedback
leen 0501
leen 0502
leen 0503
leen 0504
leen 0505
Continue reading "Evaluate a product/market fit"

The blockchain beyond bitcoin

Taking blockchain technology private for the enterprise. Blockchain technologies have been made popular by the creation of bitcoin, but how exactly can a blockchain benefit an enterprise? A blockchain provides an immutable store of facts. This model delivers significant value in the face of regulatory oversight by providing irrevocable proof that transactions occurred. Some even refer to these uses of a blockchain as enterprise resource planning (ERP) 2.0. The foundational pieces that comprise a blockchain model are already in place in one fashion or another within most enterprises. They have not, however, been pieced together with the required technology components to produce the benefits of a blockchain. There are three main components required to deliver these benefits: a shared distributed ledger, smart contracts, and consensus.

Shared distributed ledger

This is really as simple as it sounds. The key detail of the ledger is that you cannot go back and
Continue reading "The blockchain beyond bitcoin"