Skip to main content

ProLinks #4

Lot of stuff about serverless and other changes that are coming to IT world and also interesting looks into alt-right and Antifa worlds. All this and more in this week edition of ProLinks.

www.bluecoat.com/

IT


No, I have no side code projects to show you - I have no presence on github. I have no open-source projects with which I whittle away my evenings. I have exactly zero pull requests for any of the latest sexy codebases all the cool coders are in on. I don't mess around with exercises in Haskel. And I loathe hackathons.

Why would anyone choose Docker over fat binaries? - I have the impression that Docker is an incredible technical feat that barely manages to keep an old paradigm alive.

I interviewed at five top companies in Silicon Valley in five days, and luckily got five job offers - In the five days from July 24th to 28th 2017, I interviewed at LinkedIn, Salesforce Einstein, Google, Airbnb, and Facebook, and got all five job offers.

What is backpropagation and what is it actually doing? | Deep learning, chapter 3


NIST launches new face recognition evaluation - The National Institute of Standards and Technology (NIST) has launched a major new evaluation of face recognition technologies.

Coding Without Limits - What would we be able to accomplish if we were not victims of time pressure, blockers, inherited code bases, political games or economic distress?

Thinking in Symbols for Universal Design - Benjamin Wilkins, Airbnb


Top 19 Software Architecture Books - Expand your development knowledge with these books on a wide variety of software architecture topics, such as domain-driven design.

MINIX: ​Intel's hidden in-chip operating system - Buried deep inside your computer's Intel chip is the MINIX operating system and a software stack, which includes networking and a web server. It's slow, hard to get at, and insecure as insecure can be.

An Open Letter to Intel - Thanks for putting a version of MINIX inside the ME-11 management engine chip used on almost all recent desktop and laptop computers in the world.

If The World Was Created By A Programmer - In the beginning, there was light and darkness and stack overflow, which is really just a combination of the two.

The Java Fork-Join Pool Framework (Part 1)


Functional Programming Jargon - Functional programming (FP) provides many advantages, and its popularity has been increasing as a result. However, each programming paradigm comes with its own unique jargon and FP is no exception.

Why Senior Devs Write Dumb Code and How to Spot a Junior From A Mile Away - Often, the way to write fast code in Java applications is to write dumb code — code that is straightforward, clean, and follows the most obvious object-oriented principles.

Serverless vs. Containers: How Serverless Will Win - Serverless vs. Containers is a Matter of What’s Easy and Cost Effective.

The end of the cloud is coming - We’re facing the end of the cloud. It’s a bold statement, I know, and maybe it even sounds a little mad. But bear with me.

Keynote: The Value of Values - Rich Hickey compares value-oriented programming with place-oriented programming concluding that the time of imperative languages has passed and it is the time of functional programming.

GOTO 2017 • Why the Fuss about Serverless • Simon Wardley


Technology


Who Actually Owns Your Content When You Post It to the Web - Signing the terms and conditions on your favorite social networks could mean signing away the rights to that video of your kid’s birthday party, or that sweet snapshot you took on vacation.

YOU WILL NOT UNDERSTAND THIS - This is my exit interview from social media. Some of these “services” I abandoned years ago. Others I am still struggling to avoid.

Ashamed to work in Silicon Valley: how techies became the new bankers - When Danny Greg first moved to San Francisco to work at Github in 2012, he used to get high-fives in the street from strangers when he wore his company hoodie. These days, unless he’s at an investor event, he’s cautious about wearing branded clothing that might indicate he’s a techie. 

Miscellaneous


The two questions I ask every interviewer - What's your goal when interviewing a candidate?

The Other Reformation: How Martin Luther Changed Our Beer, Too - For among the things it impacted was a drink beloved throughout the world and especially in Luther's native Germany: beer.

Monster magnet meets blood...


Western philosophy is racist - Academic philosophy in ‘the West’ ignores and disdains the thought traditions of China, India and Africa. This must change

Field of Vision - A Night at the Garden


For the love of Earth, stop traveling - Realistically, is there anything that you or I can do as individuals to make a significant difference in the short time remaining?

Hooked: how slot machines are designed to be addictive - Poker machines use a range of design features that leverage psychology to keep people playing.

Are Your Kids Too Fragile? How to Make the Next Generation More Resilient.


Why No One Trusts the Mainstream Media


Economic Development: Last Week Tonight with John Oliver



The Black Bloc: Inside America’s Hard Left


Inside America's Largest Right Wing Militia


Check out my Slovak newsletter.

Comments

Popular posts from this blog

ProLinks #65 - North Korea, Cryptocurrencies, Propaganda and more

Tech The Incredible Rise of North Korea’s Hacking Army He was right. As the newspapers soon reported, more than sixteen million dollars was withdrawn from roughly seventeen hundred 7-Eleven A.T.M.s across Japan that morning, using data stolen from South Africa’s Standard Bank. The newspapers surmised that 7-Elevens had been targeted because they were the only convenience stores in Japan whose cash terminals all accepted foreign cards. Soon after the raids, the withdrawal limit for many A.T.M.s in the country was reduced to fifty thousand yen Why Cryptocurrency Is A Giant Fraud ❧ Current Affairs Schweikert is partly right: “selling it as a revolution” is a hugely important part of why cryptocurrency is succeeding. But as is generally the case when someone is trying to sell you something, the whole thing should seem extremely fishy. In fact, much of the cryptocurrency pitch is worse than fishy. It’s downright fraudulent, promising people benefits that they will not get and trying

ProLinks Biometrics #51 - Clearview AI and the backlash

This edition brings good and bad news about controversial company Clearview AI. You can also find out about best practices working with biometrics or huge fines for Facebook and Google. Enjoy! Biometrics Identifying anybody thanks to social media This New York Time expose of a not that well known company shows how companies and governments can utilize public information to identify anybody using facial recognition. The companies from which the Clearview AI scrapped the data are fighting back though . Without some serious changes in possibilities to scrape web we are screwed anyway, as researchers have build their own version of Clearview in about two weeks . Source: https://kirenaga.com Best practices for storing biometrics Jeffrey N. Rosenthal and David J. Oberly of Blank Rome LLP. have provided short summary of issues you may face if you want to be in business of storing and working with biometrics , make sure to check it out. BIPA in action Illinois Biometric

ProLinks #11

First ProLinks edition in 2018 brings a lot of links for IT professionals including solid Ruby criticism. Also interesting links about society, science and more inside. IT Managing Engineers with Ron Lichty The Problem Solver - Good developers are good problem solvers. They turn each task into a series of problems they have to solve. Energy Efficiency: A New Concern for Application Software Developers - The prevalence and ubiquity of mobile computing platforms, such as smartphones, tablets, smart watches, and smart glasses, have changed the way people use and interact with software. Clever ideas that failed -  The cleverness of an idea is proportionate to its odds of failure. SSH Security and You - /bin/false is *not* security - I thought to myself, "Fine, no shell for me. I wonder if port forwarding works?" The 100x Engineer - If we want to be 100x engineers — engineers who have 100x the impact of ye’ old 1x engineer—how do we accomplish tha

ProLinks Biometrics #49 - How biometrics is making spying hard

In this edition the highlight for me is an article from Yahoo news about the trouble spy agencies are in because of biometrics and surveillance (I love irony). Other than that, you can read about reducing friction or using biometrics to track police (again, I love irony). Enjoy! Biometrics How biometrics has changed spying Biometrics at borders control, using it to issue documents or checking at hotels is making work of spies using fake identities hard to impossible, depending on a state. For example, Singapore will alert security forces if somebody is taking too long to check into a hotel . Read the linked article to find out much more. Source: privateinternetaccess.com Reducing friction Nowadays is all about the user experience and friction or the lack of it. User do not like to make unnecessary actions to accomplish something . Reducing friction is mostly great, but there are also downsides, as overusing social networks. Making sure that policemen are working Pol

Are there types of programmers?

As a response to my previous post about why there is so many programming languages I got very interesting answer about types of programmers. Than I have read linked article about Mort, Elvis, Einstein, and You  and subsequently post The Two Types of Programmers  which lead me to The Fourteen Types of Programmers .  As you have probably realized, there are many different opinions on this topic. So what is the reality? Let me add to the pile of opinions. It always comes down to this - How do we set the criteria on which we want to categorize. Based on these criteria we can form clusters. These clusters of programmers are than our categories. You could probably do this with clustering algorithm if you can form reasonable dataset. So basically the question how many types of programmers are there  cannot be answered without specifying your criteria. And from this misunderstanding of how the question works comes discussions about how many categories there is. There