Issue #77
Curated list of blogs, videos, papers, podcasts on programming and distributed systems.
"When the sharks bit you, do not bleed"
- Kofi Annan
Posts
WebReplay
Web Replay is a project to allow Firefox content processes to record their behavior, replay it later, and rewind to earlier states. - #developer #mozilla
Everything I know about Kubernetes I learned from a cluster of Raspberry Pis
Deploying Kubernetes on Raspberry Pis - #jeffgeerling
Dining Preferences of the Cloud and Open Source: Who Eats Who?
TL;DR: If the cloud didn’t eat Hadoop Inc., Pivotal and Red Hat, what explains their diminished prospects? - #platformonomics
I'm not burned out, I'm pissed off
I'm pissed off at the state of information security. I'm pissed off that our tooling is falling behind. I'm pissed off that my clients don't seem to take it seriously, and I'm pissed off that the vendors don't seem to want to help. - #myname
How to annotate literally everything
Comprehensive overview of existing tools, strategies and thoughts on interacting with your data - #beepb00p
5 Things I’ve Learned in 20 Years of Programming
This made me wonder to myself, “if I could summarize this experience into succinct bits of advice, and assuming that anyone actually cared, what would I tell these folks?” - #daedtech
The bus ticket theory of genius
Everyone knows that to do great work you need both natural ability and determination. But there's a third ingredient that's not as well understood: an obsessive interest in a particular topic. - #paulgraham
Hard Problems in Cryptocurrency: Five Years Later
In 2014, I made a post and a presentation with a list of hard problems in math, computer science and economics that I thought were important for the cryptocurrency space (as I then called it) to be able to reach maturity. In the last five years, much has changed. - #vitalik
To Message Bus or Not: Distributed Systems Design
There are many decisions that you need to make in the architecture early that have long reaching impacts. One of these decisions is how systems will communicate.
- Will components expose RESTful APIs?
- Will they interact with a messaging system (e.g. RabbitMQ, NATS, Kafka)? GRPC?
- How will they share responses? - #netlify
Videos
Six Little Lines of Fail - Jimmy Bogard
The code looks simple, 6 little lines of distributed systems code. But those lines hid a dark secret that we only found after launching. - #youtube
"Correctness proofs of distributed systems with Isabelle" by Martin Kleppmann
Many real systems, especially distributed systems, have a potentially infinite state space. If you want to be sure that a program does the right thing in all possible situations, testing is not sufficient: you need proof. Only mathematical proof, e.g. by induction, can cover an infinite state space. - #youtube
Computer Architecture - ETH Zürich - Fall 2019
This course introduces the basic hardware structure of a modern programmable computer, including the basic laws underlying performance evaluation.
Books
Interactive Linear Algebra
The name of the textbook highlights an important theme: the synthesis between algebra and geometry. It will be very important to us to understand systems of linear equations both algebraically (writing equations for their solutions) and geometrically (drawing pictures and visualizing). - #textbooks #math #gatech
Reverse Engineering for Beginners
The reverse engineering of software; researching compiled programs (Understanding Assembly Language) - #beginners
An Overview of Cryptography - Gary C. Kessler
There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting health care information. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. The reader is advised, then, that the topics covered here only describe the first of many steps necessary for better security in any number of situations.
This paper has two major purposes. The first is to define some of the terms and concepts behind basic cryptographic methods, and to offer a way to compare the myriad cryptographic schemes in use today. The second is to provide some real examples of cryptography in use today - #garykessler