Skip to main content

ProLinks #24

About end of windows, reinventing the wheel, cost per decision and more.



IT


One of Estonia's first "e-residents" explains what it means to have digital citizenship - An online community survey recently asked me where I’m based. Without hesitation, I answered “Estonia.” You might ask: as a US citizen, why in the world did I do that?

Observability: A Manifesto - Everybody and their freaking grandpa is now claiming to do observability, not stodgy old monitoring. Fine, great. Nice to be trendy I guess.

The End of Windows - What is more interesting, though, is the story of Windows’ decline in Redmond, culminating with last week’s reorganization that, for the first time since 1980, left the company without a division devoted to personal computer operating systems.

Sane Office Environment with Code Review Guidelines - Code reviews help keep code clean, efficient, and productive. Find here some checklists and the dos and don'ts for reviewers.

Please, reinvent the wheel -  Linux is a reinvention of Unix, MariaDB is a reinvention of MySQL (MySQL being a reinvention of PostgreSQL/OracleDb and PostgreSQL being a reinvention of various Oracle databases and others).

AFIS identifies child abuse suspect - The Texas Department of Public Safety Crime Lab in Austin has identified a child abuse suspect from a fingerprint taken from just a photograph of his fingers.

Software Development Design Principles - When people start out as self-taught programmers, a lot of the times we think about creating an application that simply works. It works, perfect! ONTO THE NEXT VICTIM!

Things I have learnt as the software engineering lead of a multinational - 1.  When the plan is foggy, that’s the moment to communicate as broadly as possible. In fact you should not frame it as a plan, you frame it as the situation and the final state you want to achieve.

50 Common Misconceptions In The World Of Software Development - This post is to help you introspect your thoughts on varied things that float in the realm of software development.

Testing in Production, the safe way - In this post, I hope to explore different forms of “testing in production”, when each form of testing is the most beneficial as well as how to test services in production in a safe way.

It's about what broke, not who broke it - Who broke it is frequently just a roll of the dice: who got that particular task, bug, or ticket assigned to them, and happened to run this valid command instead of that also-valid command?

Holey Beep - Holey Beep (CVE-2018-0492) is the latest breakthrough in the field of acoustic cyber security research.


Miscellaneous


Cost Per Reasonable Decision (CPRD) - Consider the costs: the email threads, the 1:1s, the small meetings, the large meetings, the meeting prep, the mockups and samples prepared, the time spent communicating the decision, the meetings to rehash the decision (and correct the misunderstandings caused by having so many people involved)…and the opportunity costs of all that time/energy that could be spent elsewhere.

Who would win in a rap battle between Eminem and Kanye West? Why? - Although the battle is fictitious it shows how Eminem is a master of not only the art of battle but the art of using cognitive bias to sway an audience in enough for you to win any battle.

Optimism is your worst enemy - You need to quit being so optimistic.

How To Play Video Games Without Messing Up Your Body - It’s obvious that parking your butt on the couch for several hours straight playing a game isn’t good for you, but sometimes it’s hard to resist. Here’s how to do it without messing up your body.

Check out my Slovak newsletter (if you understand Slovak :) ). 

Subscribe to this newsletter by email


Delivered by FeedBurner

Comments

Popular posts from this blog

ProLinks #57 - Truth, Wayland and Sex Tapes

Tech Let's talk about Wayland ... This is the fundamental principle of every single product (including security products). If you cannot use a thing, because its "safety" or "security" mechanisms prevents the core functionality from being utilized in the intended fashion, the product is useless. For example, a Web browser without an Internet connection is possibly very secure from Internet exploits - but it also doesn't do its main function - let people browse the Internet Speed is the killer feature When you touched a Razr or a Palm phone, there was a delay. It felt sluggish and slow. Apple removed the delay between your finger tapping the screen and something happening. Your finger could finally manipulate the UI in realtime, just like in the real world. It felt magical. If there was even a slight delay, the whole experience fell apart. Everything is broken, and it’s okay Every car you’ve ever ridden in, every elevator you’ve ever taken, every s

Learning sources for IT Consultant

I went into IT consulting. And as with everything that I start anew, I have tried to find some good learning materials and sources to get me started. But it got really difficult really quickly. As I found out, there are not many materials and sources focused specifically on this topic. This got me thinking. How is this possible? There are tons of materials for business consulting, so how come there are almost non for IT? So I thought about it. And than it hit me. There are lots of materials for IT consultant. They are just not named as such.  First of all, IT consultancy is pretty broad topic so it depends on what are you consulting. Is it software development? Is it security? Is it biometrics systems? Based on the topic you are consulting you can find needed domain knowledge. You can be brilliant programmer, but if you have no idea about given domain, you will be no help to your client. Secondly, consultancy is the same when it comes to soft skills regardless if you a

ProLinks #58 - Evangelicals, Screen time and BASE Jumping

Tech The technical interview practice gap, and how it keeps underrepresented groups out of software engineering MIT gave me was a big stamp on my forehead that, to this day, makes strangers think I’m smart. But there was another, more relevant gift that gave me a serious advantage over students who did not attend an elite computer science institution: boundless access to technical interview practice. Not only was there a multi-week course during the month-long break between Fall and Spring semesters that was dedicated exclusively to passing technical interviews, but all of my peers were going through exactly the same thing at the same time Clone Wars - Open source clones of popular sites 70+ open-source clones of popular sites like Airbnb, Amazon, Instagram, Netflix, Tiktok, Spotify, Trello, Whatsapp, Youtube, etc. List contains source code, demo links, tech stack, and, GitHub stars count. Great for learning purpose!  “Well, it seems great to me” But if your music, your graphic

ProLinks #65 - North Korea, Cryptocurrencies, Propaganda and more

Tech The Incredible Rise of North Korea’s Hacking Army He was right. As the newspapers soon reported, more than sixteen million dollars was withdrawn from roughly seventeen hundred 7-Eleven A.T.M.s across Japan that morning, using data stolen from South Africa’s Standard Bank. The newspapers surmised that 7-Elevens had been targeted because they were the only convenience stores in Japan whose cash terminals all accepted foreign cards. Soon after the raids, the withdrawal limit for many A.T.M.s in the country was reduced to fifty thousand yen Why Cryptocurrency Is A Giant Fraud ❧ Current Affairs Schweikert is partly right: “selling it as a revolution” is a hugely important part of why cryptocurrency is succeeding. But as is generally the case when someone is trying to sell you something, the whole thing should seem extremely fishy. In fact, much of the cryptocurrency pitch is worse than fishy. It’s downright fraudulent, promising people benefits that they will not get and trying

ProLinks #59 - Terrible men, Facebook and SOCOM

Tech You’re Doing It Wrong: Notes on Criticism and Technology Hype What is less obvious is why Shoshana Zuboff, an emerita professor of Harvard Business School, so uncritically repeats the digital industry’s marketing materials, nor why she never points to or assesses evidence that goes against her argument. Yet her writings are full of hyperbole that sounds like she took press releases from Facebook’s and Google’s PR departments and rewrote them to be alarming, How Facebook got addicted to spreading misinformation Zuckerberg’s obsession with getting the whole world to use Facebook had found a powerful new weapon. Teams had previously used design tactics, like experimenting with the content and frequency of notifications, to try to hook users more effectively. Their goal, among other things, was to increase a metric called L6/7, the fraction of people who logged in to Facebook six of the previous seven days. L6/7 is just one of myriad ways in which Facebook has measured “e