- Google Has Spent 21 Billion on Data Centers — The company invested a record $1.6 billion in its data centers in the second quarter of 2013. Puts my impulse-purchased second external hard-drive into context, doesn’t it honey?
- 10x Engineer (Shanley) — in which the idea that it’s scientifically shown that some engineers are innately 10x others is given a rough and vigorous debunking.
- How to Hire — great advice, including “Poaching is the titty twister of Silicon Valley relationships”.
- Think Like a Git — a guide to git, for the perplexed.
ENTRIES TAGGED "git"
Google's Data Centers, Top Engineers, Hiring, and Git Explained
Git Secrets, Ab Initio Keyboard, Continuous Deployment, and 3D Atomic Models
- More Git and GitHub Secrets (Zach Holman) — wizards tricks. (via Rowan Crawford)
- Building a Keyboard from Scratch (Jesse Vincent) — for the connoisseur.
- Practicing Deployment (Laura Thomson) — you should build the capability for continuous deployment, even if you never intend to continuously deploy.
- 3D Printed Atoms (Thingiverse) — customize and 3d-print a Bohr model of any atom.
- Product Strategy Means Saying No — a resource for strength in saying ‘no’ to unplanned features and direction changes. My favourite illustration is for “but my cousin’s neighbour said”. Yes, this.
- git-imerge — incremental merge for git.
- The Paranoid #! Security Guide — Networked-Evil-Maid-Attacks (Attacker steals the actual SED and replaces it with another containing a tojanized OS. On bootup victim enters it’s password which is subsequently send to the attacker via network/local attacker hot-spot. Different method: Replacing a laptop with a similar model [at e.g. airport/hotel etc.] and the attacker’s phone# printed on the bottom of the machine. Victim boots up enters “wrong” password which is send to the attacker via network. Victim discovers that his laptop has been misplaced, calls attacker who now copies the content and gives the “misplaced” laptop back to the owner.)
Geodata DVCS, Monitoring Stack, Robotic Roaches, and Audio Destress
- geogit — opengeo project exploring the use of distributed management of spatial data. [...] adapts [git's] core concepts to handle versioning of geospatial data. Shapefiles, PostGIS or SpatiaLite data stored in a change-tracking repository, with all the fun gut features for branching history, merging, remote/local repos, etc. BSD-licensed. First sound attempt at open source data management.
- Introducing Loupe — Etsy’s monitoring stack. It consists of two parts: Skyline and Oculus. We first use Skyline to detect anomalous metrics. Then, we search for that metric in Oculus, to see if any other metrics look similar. At that point, we can make an informed diagnosis and hopefully fix the problem.
- Bluetooth-Controlled Robotic Cockroach (Kickstarter) — ’nuff said. (via BoingBoing)
- Nature Sounds of New Zealand — if all the surveillance roboroach anomaly detection drone printing stories get to you, put this on headphones and recharge. (caution: contains nature)
What Matters, NetSec Game, Coding Freedom, and Pro Git
- Things Users Don’t Care About (Pete Warden) — every day we relearn these lessons. How great it will be once all their friends are on it.
- Tracer FIRE 5 — online workshop and game that teaches network security. [A] week-long hands-on computer security workshop for cyber defenders in DOE, other government agencies, critical infrastructure, and college students. The exercise consists of 2 days of intensive training on a single subject, followed by a 2½-day game in which contestants are placed on a team and must use their new and existing skills to compete with other teams for points across multiple categories. (via Reddit /r/netsec)
- Coding Freedom: The Ethics and Aesthetics of Hacking (Amazon) — Gabriella Coleman’s new book, which explains us. Exploring the rise and political significance of the free and open source software (F/OSS) movement in the United States and Europe, Coding Freedom details the ethics behind hackers’ devotion to F/OSS, the social codes that guide its production, and the political struggles through which hackers question the scope and direction of copyright and patent law. In telling the story of the F/OSS movement, the book unfolds a broader narrative involving computing, the politics of access, and intellectual property. (Also available as CC-Licensed PDF)
- Pro Git (Scott Chacon) — CC-NC-SA licensed book on mad git skills.
Why C is a more practical and enticing programming language than you might think.
Mac git tool, Web Developer Tool, Bullshit Detector, and ISPs Join Devil For Baby-Eating Orgy
- Wing Man — Mac app for source control management with git, implements workflow rather than simply being a wrapper for git commandlines.
- CodeKit — Mac app for web developers, automates (invisibly, thanks to watching filesystem changes) much of the web site tools.
- LazyTruth — Chrome plugin for gmail that detects bogus forwarded email and gives you the option to reply with the truth. RoboSnopes for the win! (via The Atlantic)
- Verizon to Throttle Pirates (BBC) — unable to solve their business model problems though the courts, Hollywood “partners” with ISPs to extra-judicially punish alleged infractions. ISPs win when heavy downloaders are throttled, of course, because it lets them have higher contention ratios (sell the same upstream cable to many more downstream email-checking residences instead of just a few torrenters). These five ISPs are mall-cops, private tax collectors, and regional monopolists, all in one nasty bundle of evil.
An interview with Matthew McCullough
Advice from author of "Version Control with Git."
After finishing the second edition of "Version Control with Git," author Jon Loeliger talked to O'Reilly editor Andy Oram about how to use Git effectively as changes to code pile up.