Skip to main content

Home/ Groups/ InnoDev
1More

Don't leave developers in the dark - 0 views

  •  
    Need-to-know (like other security measures) can be misused by persons who wish to refuse others access to information they hold in an attempt to increase their personal power or prevent unwelcome review of their work.
1More

Quake on an oscilloscope: A technical report - 0 views

  •  
    perfektne vysvetlene ako vizualizovat hru Quake na (lepsom) osciloskope.

Zaujimave security linky #1 - 2 views

started by Stano Bocinec on 04 Mar 15 no follow-up yet
1More

​No reboot patching comes to Linux 4.0 | ZDNet - 1 views

  •  
    With the new Linux 4.0 kernel, you'll need to reboot Linux less often than ever. Uz nikdy viac reboot :)
2More

Support for Ruby 1.9.3 has ended - 1 views

  •  
    As of today, all support for Ruby 1.9.3 has ended. Bug and security fixes from more recent Ruby versions will no longer be backported to 1.9.3.
  •  
    necakane skoro :| som zvedavy, pri ktorej verzii zakotvia nase projekty. Ruby v2.1 ma nejake problemy s GC http://stackoverflow.com/questions/27102565/memory-usage-increase-with-ruby-2-1-versus-ruby-2-0-or-1-9 a webafis uz podporuje Ruby 2.0+ ?
1More

has_many considered harmful - 2 views

  •  
    has_many is an anti-pattern which leads straight to monolithic applications. However, a simple inversion can free us from its grasp. What is the first model you added to your application? Probably User, right? So, once you wrote user.rb and its corresponding tests, and committed it - why did you ever open that file up again to tell it about something that it did not need to know existed? Rails keeps you from reopening user.rb if you add a column to the User table, and this is good, right? So why, when you added a Posts table far away, did you open up User again to make it aware of Posts? Did the definition of being a user change? Did you did not realize you were violating the Open-Closed Principle, one of the 5 principles of SOLID design? Somewhere inside I bet you knew it felt dirty to keep opening up User and making it aware of things that it had been blissfully unaware of.
1More

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle (Gemalto) - 2 views

  •  
    AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards.
1More

How to Think Like a Maker: Values Your Company Should be Adopting - 2 views

  •  
    pre porovnanie vizie a misie :)
2More

How do I edit an incorrect commit message in git (I've pushed)? - 0 views

  •  
    Aj vas irituje nemoznost menit commit messages? Zaujimalo ma vzdy preco, ci to ma dobre odovodnenie a dnes som to nahodou nasiel: The message from Linus Torvalds may answer your question: Modify/edit old commit messages Short answer: you can not (if pushed). extract (Linus refers to BitKeeper as BK): Side note, just out of historical interest: in BK you could. And if you're used to it (like I was) it was really quite practical. Co ja viem, podla mna nie az tak rozumne, ved moznost commit-ovat davame tym ktorym verime, ja nevidim take velke riziko v tom, ked commiters mozu menit messages. Stava sa mi, ze si pomylil cislo JIRA issue a uz je neskoro, nic sa s tym neda spravit. Vtedy ma mrzi, ze som clovek :)
  •  
    mercurial na to ma feature ktora je natolko specialna ze ani nie je v beznom release :), ak som to pochopil spravne je to nieco ako meta-verzionovanie: http://mercurial.selenic.com/wiki/EvolveExtension
1More

Comcast - Simulating shitty network connections so you can build better systems. - 1 views

  •  
    Testing distributed systems under hard failures like network partitions and instance termination is critical, but it's also important we test them under less catastrophic conditions because this is what they most often experience. Comcast is a tool designed to simulate common network problems like latency, bandwidth restrictions, and dropped/reordered/corrupted packets. It works by wrapping up some system tools in a portable(ish) way. On BSD-derived systems such as OSX, we use tools like ipfw and pfctl to inject failure. On Linux, we use iptables and tc. Comcast is merely a thin wrapper around these controls.
1More

Your anonymous code contributions probably aren't: boffins - 1 views

  •  
    There's no such thing as an anonymous programmer: your coding style can unmask you, according to research led by Drexel University Comp. Sci. PhD student Aylin Caliskan-Islam. In work that has serious implications for anyone believing their open source project contributions are anonymous, the researchers find that as many as 95 per cent of contributors to a decent-sized code base can be identified.
1More

How to reward skilled coders with something other than people management - 2 views

  •  
    The longer an engineer remains at a company, the harder it is to find a few hours of isolation, free from interruption, to get work done.
1More

Celebration of *Day Against DRM* at O'Reilly - 50% off on all 8000+ Ebooks & Videos - 0 views

  •  
    In Celebration of *Day Against DRM* Save 50% on all 8000+ Ebooks & Videos Use Code: DRM2014 Deal expires May 7, 2014 at 5am PT, and cannot be combined with other offers or applied to Print, or "Print & Ebook" bundle pricing.
1More

Inside India's Aadhar, The World's Biggest Biometrics Database - 0 views

  •  
    So why did Aadhar engage with MongoDB in the first place and will it continue working with the startup? Sudhir Narayana, assistant director general at Aadhar's technology center, told me that MongoDB was among several database products, apart from MySQL, Hadoop and HBase, originally procured for running the database search. Unlike MySQL, which could only store demographic data, MongoDB was able to store pictures. However, Aadhar has been slowly shifting most of its database related work to MySQL, after realizing that MongoDB was not being able to cope with massive chunks of data, millions of packets.
1More

Condor Blue - 1 views

  •  
    variacia na oblubeny kuraci "gordon blue"
1More

Cocktails for programmers - 3 views

  •  
    je tam aj Ruby
1More

Hackovanie daní a odvodov pre web developerov - 3 views

  •  
    via Rubyslava
« First ‹ Previous 101 - 120 Next › Last »
Showing 20 items per page