- Juju — Canonical’s cloud orchestration software, intended to be a peer of chef and puppet. (via svrn)
- Cultural Heritage Symbols — workshopped icons to indicate interactives, big data, makerspaces, etc. (via Courtney Johnston)
- Quinn Norton: Students as Hackers (EdTalks) — if you really want to understand the future, don’t look at how people are looking at technology, look at how they are misusing technology.
ENTRIES TAGGED "devops"
However one defines "enterprise," what really matters is an organization's culture.
Retro Hackery, Etsy Ops, Distributed Identity, and lolcoders
- How Things Work: Summer Games Edition — admire the real craftsmanship in those early games. This has a great description of using raster interrupts to extend the number of sprites, and how and why double-buffering was expensive in terms of memory.
- IAMA: Etsy Ops Team (Reddit) — the Etsy ops team does an IAMA on Reddit. Everything from uptime to this sage advice about fluid data: A nice 18 year old Glenfiddich scales extremely well, especially if used in an active active configuration with a glass in each hand. The part of Scotland where Glenfiddich is located also benefits from near-permanent exposure to the Cloud (several clouds in fact). (via Nelson Minar)
- Who Learns What When You Log Into Facebook (Tim Bray) — nice breakdown of who learns what and how, part of Tim’s work raising the qualify of conversation about online federated identity.
- lolcommits — takes a photo of the programmer on each git commit. (via Nelson Minar)
Modern Security Ethics, Punk'd Chinese Cyberwarriors, Web Tracing, and Lightweight Server OS
- White Hat’s Dilemma (Google Docs) — amazeballs preso with lots of tough ethical questions for people in the computer field.
- Chinese Hacking Team Caught Taking Over Decoy Water Plant (MIT Tech Review) — Wilhoit went on to show evidence that other hacking groups besides APT1 intentionally seek out and compromise water plant systems. Between March and June this year, 12 honeypots deployed across eight different countries attracted 74 intentional attacks, 10 of which were sophisticated enough to wrest complete control of the dummy control system.
- Web Tracing Framework — Rich tools for instrumenting, analyzing, and visualizing web apps.
- CoreOS — Linux kernel + systemd. That’s about it. CoreOS has just enough bits to run containers, but does not ship a package manager itself. In fact, the root partition is completely read-only, to guarantee consistency and make updates reliable. Docker-compatible.
Startups Class, Container Deployment, Cryptopocalypse, and Program Design
- EP245 Downloads — class materials from the Udacity “How to Build a Startup” course.
- scrz.io — easy container deployment.
- The Factoring Dead: Preparing for the Cryptopocalypse — how RSA and Diffie-Helman crypto might be useless in the next few years.
- How to Design Programs — 2ed text is a work-in-progress.
Git Secrets, Ab Initio Keyboard, Continuous Deployment, and 3D Atomic Models
- More Git and GitHub Secrets (Zach Holman) — wizards tricks. (via Rowan Crawford)
- Building a Keyboard from Scratch (Jesse Vincent) — for the connoisseur.
- Practicing Deployment (Laura Thomson) — you should build the capability for continuous deployment, even if you never intend to continuously deploy.
- 3D Printed Atoms (Thingiverse) — customize and 3d-print a Bohr model of any atom.
Good Dev, User-Hostile Patterns, Patent Victories, and Drone History
- What to Look For in Software Dev (Pamela Fox) — It’s important to find a job where you get to work on a product you love or problems that challenge you, but it’s also important to find a job where you will be happy inside their codebase – where you won’t be afraid to make changes and where there’s a clear process for those changes.
- The Slippery Slope to Dark Patterns — demonstrates and deconstructs determinedly user-hostile pieces of software which deliberately break Nielsen’s usability heuristics to make users agree to things they rationally wouldn’t.
- Victory Lap for Ask Patents (Joel Spolsky) — story of how a StackExchange board on patents helped bust a bogus patent. It’s crowdsourcing the prior art, and Joel shows how easy it is.
- The World as Fire-Free Zone (MIT Technology Review) — data analysis to identify “signature” of terrorist behaviour, civilian deaths from strikes in territories the US has not declared war on, empty restrictions on use. Again, it’s a test that, by design, cannot be failed. Good history of UAVs in warfare and the blowback from their lax use. Quoting retired General Stanley McChrystal: The resentment caused by American use of unmanned strikes … is much greater than the average American appreciates. They are hated on a visceral level, even by people who’ve never seen one or seen the effects of one.
Model-Driven Configuration, 1,000 RSS Readers Bloom, JSON Query Language, and Doug Engelbart's Vision
- ansible — Model-driven configuration management, multi-node deployment/orchestration, and remote task execution system. Uses SSH by default, so no special software has to be installed on the nodes you manage. Ansible can be extended in any language.
- The Golden Age of RSS — One of the things I expected least to see in 2013 was that this year would mark the greatest flourishing of RSS reader applications in the decade since it first came to prominence on the web.
- JSONiq: the JSON Query Language — expressive and highly optimizable language to query and update NoSQL stores. It enables developers to leverage the same productive high-level language across a variety of NoSQL products. Implemented in Zorba, an Apache-licensed virtual machine for JSONiq and XQuery queries.
- Bret Victor on Doug Engelbart — If you attempt to make sense of Engelbart’s design by drawing correspondences to our present-day systems, you will miss the point, because our present-day systems do not embody Engelbart’s intent. Engelbart hated our present-day systems. Poetic, articulate, and bang on the money.
Geodata DVCS, Monitoring Stack, Robotic Roaches, and Audio Destress
- geogit — opengeo project exploring the use of distributed management of spatial data. [...] adapts [git's] core concepts to handle versioning of geospatial data. Shapefiles, PostGIS or SpatiaLite data stored in a change-tracking repository, with all the fun gut features for branching history, merging, remote/local repos, etc. BSD-licensed. First sound attempt at open source data management.
- Introducing Loupe — Etsy’s monitoring stack. It consists of two parts: Skyline and Oculus. We first use Skyline to detect anomalous metrics. Then, we search for that metric in Oculus, to see if any other metrics look similar. At that point, we can make an informed diagnosis and hopefully fix the problem.
- Bluetooth-Controlled Robotic Cockroach (Kickstarter) — ’nuff said. (via BoingBoing)
- Nature Sounds of New Zealand — if all the surveillance roboroach anomaly detection drone printing stories get to you, put this on headphones and recharge. (caution: contains nature)
Inside NASDAQ's Failbook, SimAustralia, Distraction Attraction, and Big Brother Says "Wash Your Hands!"
- Facebook IPO Tech Post-Mortem (PDF) — SEC’s analysis of the failures that led to the NASDAQ kicking Facebook’s IPO in the NADSAQ. (via Quartz)
- Run That Town — SimCity for real cities, from the Australian Bureau of Statistics and using real census data. No mention of whether you can make your citizens shout “Aussie Aussie Aussie, Oi Oi Oi!” after three cans of lager at an Aussie Rules game. (via John Birmingham)
- Maintaining Focus (The Atlantic) — excellent Linda Stone interview. We may think that kids have a natural fascination with phones. Really, children have a fascination with what-ever Mom and Dad find fascinating. If they are fascinated by the flowers coming up in the yard, that’s what the children are going to find fascinating. And if Mom and Dad can’t put down the device with the screen, the child is going to think, That’s where it’s all at, that’s where I need to be! I interviewed kids between the ages of 7 and 12 about this. They said things like “My mom should make eye contact with me when she talks to me” and “I used to watch TV with my dad, but now he has his iPad, and I watch by myself.”
- Networked Motion Sensors in Hospital Bathrooms (NY Times) — At North Shore University Hospital on Long Island, motion sensors, like those used for burglar alarms, go off every time someone enters an intensive care room. The sensor triggers a video camera, which transmits its images halfway around the world to India, where workers are checking to see if doctors and nurses are performing a critical procedure: washing their hands. [...] the video monitoring program, run by a company called Arrowsight, has been adapted from the meat industry, where cameras track whether workers who skin animals — the hide can contaminate the meat — wash their hands, knives and electric cutters.