- Seven Microservices Anti-Patterns — One common mistake people made with SOA was misunderstanding how to achieve the reusability of services. Teams mostly focused on technical cohesion rather than functional regarding reusability. For example, several services functioned as a data access layer (ORM) to expose tables as services; they thought it would be highly reusable. This created an artificial physical layer managed by a horizontal team, which caused delivery dependency. Any service created should be highly autonomous – meaning independent of each other.
- CSCI 4974 / 6974 Hardware Reverse Engineering — RPI CS course in reverse engineering.
- The Gremlin Graph Traversal Language (Slideshare) — preso on a language for navigating graph data structures, which is part of the Apache TinkerPop (“Open Source Graph Computing”) suite.
- Why Are There Still So Many Jobs? The History and Future of Workplace Automation (PDF) — paper about the history of technology and labour. The issue is not that middle-class workers are doomed by automation and technology, but instead that human capital investment must be at the heart of any long-term strategy for producing skills that are complemented by rather than substituted for by technological change. Found via Scott Santens’s comprehensive rebuttal.
"reverse engineering" entries
An overview of requested exceptions for the 2014-15 triennial review of the Digital Millennium Copyright Act.
Editor’s note: this article originally published in the July issue of Communications of the ACM (CACM); it is cross-published here with permission.
Computer security researchers and hobbyists who want to tinker with the software in their cars are among those who will find out by the end of 2015 whether the U.S. Copyright Office has issued exemptions from the Digital Millennium Copyright Act (DMCA) anti-circumvention rules. Exemptions would enable these actors to engage in reverse engineering that might bypass technical measures that protect access to copyrighted software or content. It is much to be hoped for that the Office will exempt all uses that pose no threat of copyright infringement, which is all that the anti-circumvention rules were supposed to be about. Unfortunately, the rules were drafted very broadly. Hence, the need to seek exemptions.