recentpopularlog in

danesparza : analysis   365

« earlier  
Trump team failed to follow NSC’s pandemic playbook - POLITICO
The 69-page document, finished in 2016, provided a step by step list of priorities – which were then ignored by the administration.
coronavirus  covid19  politics  scandal  whitehouse  news  article  analysis 
8 days ago by danesparza
Using the Specification Pattern to Build a Data-Driven Rules Engine | Jon Blankenship
The specification pattern can be an indispensable tool in the developer's toolbox when faced with the task of determining whether an object meets a certain set of criteria. When coupled with the composite pattern, the composite specification becomes a power tool that can tackle any combination of business rules no matter how complex, all while ensuring maintainability, robustness, and testability. In this post we'll see how the composite specification pattern can be used in a .NET application to build a data-driven rules engine.
development  programming  analysis  pattern  patterns 
14 days ago by danesparza
Coronavirus reveals financial irresponsibility of Americans | TheHill
How long could you sustain your household if you were to stop earning income? If you are like most Americans, the answer is not for long. Only 40 percent of Americans can afford an unexpected $1,000 expense with their savings. In fact, nearly 80 percent of workers are living paycheck to paycheck. It is no surprise that the probability of an economic recession brought on by the coronavirus pandemic caused many to worry.
coronavirus  finance  finances  financial  money  analysis 
14 days ago by danesparza
Aerogel from fruit biowaste produces ultracapacitors with high energy density and stability - ScienceDirect
High performance supercapacitors synthesized from durian and jackfruit biowaste. • Outstanding performance due to large surface area, mesoporous structure and intrinsic nitrogen. • Pyridinic and graphitic n and facile ionic diffusion enable high performance supercapacitance. • Excellent stability, long-term cycling, energy density with pseudo-capacitance.
energy  research  food  electronics  analysis 
4 weeks ago by danesparza
Experimental evidence of massive-scale emotional contagion through social networks
Emotional states can be transferred to others via emotional contagion, leading people to experience the same emotions without their awareness. Emotional contagion is well established in laboratory experiments, with people transferring positive and negative emotions to others.
research  analysis  statistics  social  socialdomains  network  media 
4 weeks ago by danesparza
Things I Learned From Five Years in Climate Tech
Over the past five years, I’ve worked at two startups in what is now being called the climate tech sector1. Given the recent surge in interest in this space, I thought it would be worthwhile to record a handful of lessons that I’ve learned from this experience. These lessons span business strategy and the realities of the electric utility industry.
energy  tech  utility  advice  analysis  article 
5 weeks ago by danesparza
12 Signs You’re Working in a Feature Factory | @johncutlefish's blog
I’ve used the term *Feature Factory *at a couple conference talks over the past two years. I started using the term when a software developer friend complained that he was “just sitting in the factory, cranking out features, and sending them down the line.” How do you know if you’re working in a feature factory?
agile  career  management  process  programming  development  software  analysis 
6 weeks ago by danesparza
Agile as Trauma — Dorian Taylor
Like any other creative endeavour, software development can’t be sped up as much as we can eliminate the phenomena that slow it down. Advancements in process and tooling, and the computing resources to run them, can be interpreted as doing exactly this. The result is that developers can spend a larger fraction of their time on application logic. The application logic itself gets coarser and coarser-grained with each passing year. Ideally, you could just tell the computer what you want and it would fabricate it, but if you could do this, then there would be no need for programmers.
agile  development  history  programming  software  analysis 
7 weeks ago by danesparza
Setting Up Your Webcam, Lights, and Audio for Remote Work, Podcasting, Videos, and Streaming |
First, I'll cover each section, starting from the cheapest options for each: Webcam Lighting Audio Then, I'll tell you my setup, and a few suggested full setups at various price points. My setup Bare bones Entry level remote work and podcasting Mid level remote work and podcasting Pro level podcasting Streamer/YouTuber Only you really know what level of clarity you want from each piece of your setup. Are you happy with what you have? Please, dear Lord, don't spend any money. This is intended to be a resource if you want more and don't know how to do it, not a stress or a judgment to anyone happy with their current setup.
audio  microphones  podcast  remote  video  best_practice  analysis  lighting  help  howto  development 
8 weeks ago by danesparza
Meghan Markle And Prince Harry UK Royal Reporters Coverage Compared To Kate Middleton And Prince William
Over the years, Meghan has been shamed for the same things for which her sister-in-law, Kate, has been praised.
media  analysis  racism  uk  british 
12 weeks ago by danesparza
Building a BitTorrent client from the ground up in Go | Jesse Li
tl;dr: What is the complete path between visiting thepiratebay and sublimating an mp3 file from thin air? In this post, we’ll implement enough of the BitTorrent protocol to download Debian. Look at the Source code or skip to the last bit.
article  bittorrent  go  golang  torrent  code  analysis  howto 
january 2020 by danesparza
The “Great Cannon” has been deployed again | AT&T Alien Labs
The Great Cannon is a distributed denial of service tool (“DDoS”) that operates by injecting malicious Javascript into pages served from behind the Great Firewall. These scripts, potentially served to millions of users across the internet, hijack the users’ connections to make multiple requests against the targeted site. These requests consume all the resources of the targeted site, making it unavailable:
security  china  dos  ddos  network  analysis  malware  javascript  politics 
december 2019 by danesparza
12 Common Mistakes and Missed Optimization Opportunities in SQL | Haki Benita
Most programming languages are designed for professional developers with knowledge of algorithms and data structure. SQL is different. SQL is used by analysts, data scientists, product managers, designers and many others. These professionals have access to databases, but they don't always have the intuition and understanding to write efficient queries. In an effort to make my team write better SQL, I went over reports written by non-developers and code reviews, and gathered common mistakes and missed optimization opportunities in SQL.
database  postgresql  sql  tips  performance  analysis 
november 2019 by danesparza
Air Pollution Reduces IQ, a Lot - Marginal REVOLUTION
The number and quality of studies showing that air pollution has very substantial effects on health continues to increase. Patrick Collison reviews some of the most recent studies on air pollution and cognition. I’m going to post the whole thing so everything that follows is Patrick’s.
automotive  pollution  air  quality  analysis 
november 2019 by danesparza
You should be working asynchronously (async) | Blog
Asynchronous (async) work is a way to organize the order in which tasks are executed in the pipeline of work. It allows you to fine-tune work, so that pressure is even, tasks are completed swiftly and you stay nimble.
productivity  startup  startups  howto  workplace  analysis  best_practice 
october 2019 by danesparza
SQL queries don't start with SELECT - Julia Evans
This was something that I felt like I knew intuitively (“I’ve written at least 10,000 SQL queries, some of them were really complicated! I must know this!“) but I struggled to actually articulate what the order was.
database  sql  server  article  analysis  help  troubleshooting 
october 2019 by danesparza
Buffon's needle or how ants estimate size
I came across an interesting research claiming ants estimate the area of a potential nest using an algorithm called Buffon's needle. The process can be summarized as the following: An ant scout is sent out to measure the size of a potential nest. She will need two trips. During the first trip, she leaves random trails marked with pheromones she could identify later. During the second trip, she probes the the same area again. However instead of leaving trails this time, she counts the times of crossing the trails marked during the first trip. The size of the nest is inversely proportional to the intersections.
blogging  machinelearning  engineering  analysis  process  processing  design 
september 2019 by danesparza
Exotic Physics Phenomenon Involving Time Reversal Observed for First Time
An exotic physical phenomenon, involving optical waves, synthetic magnetic fields, and time reversal, has been directly observed for the first time, following decades of attempts. The new finding could lead to realizations of what are known as topological phases, and eventually to advances toward fault-tolerant quantum computers, the researchers say.
physics  time  analysis 
september 2019 by danesparza
AgileFall: What is AgileFall?
AgileFall is a tongue-in-cheek term for a software development model where you are trying to be agile, but you keep falling into waterfall development habits. For example, a team practicing AgileFall may say:
agile  fail  agilefall  best_practice  management  software  development  analysis 
september 2019 by danesparza
7 Reasons to Outlaw React’s Functional Components
Update 5/31/19: React 16.8 added Hooks, which mean you can use functional components for nearly everything! ? Function components are the future of React. So bottom-line, use functional components for future development. That said, the tradeoffs below apply for older codebases where Hooks aren’t an option. Happy coding!
react  programming  article  functional  components  analysis 
september 2019 by danesparza
Why Go and not Rust? | Loris Cro's Personal Blog
If you’re a Go developer you might feel a bit cheated. In contrast, Python developers are not particularly fazed by Rust. They know that Python is in many ways slow and inefficient, and they’re fine with that because they know Python’s role: make the code easy to write and offload to C when performance matters. What about Go?
go  golang  rust  development  comparison  analysis  blog 
september 2019 by danesparza
Immigration panic: how the west fell for manufactured rage | UK news | The Guardian
From Trump to Orbán, politicians are winning votes by stoking age-old hatreds. Where does this fear of migrants come from?
immigration  news  politics  analysis 
august 2019 by danesparza
memtier_benchmark: A High-Throughput Benchmarking Tool for Redis & Memcached
Benchmarking is the practice of measuring the performance of a system to identify its limits. Benchmarking is an integral part of our service’s development process and we use it both for regression testing (verifying performance has not been reduced between releases) and also as an aid for optimizing database performance. It is generally considered good practice to measure the performance of your system periodically as well as after every change made to ensure it is achieving maximal performance and to potentially uncover relevant issues. To facilitate the execution of these benchmark runs, we developed our own benchmarking tool that we fondly call memtier_benchmark.
performance  redis  analysis  sysadmin  tool  tools  linux  command 
august 2019 by danesparza
RDBTools - Redis GUI and Memory Optimization Tool
RDBTools is a cross-platform GUI for redis, with a focus on reducing memory usage and improving application performance.
redis  cache  caching  performance  ui  analysis 
august 2019 by danesparza
Attorney General Barr and Encryption - Schneier on Security
As computers continue to permeate every aspect of our lives, society, and critical infrastructure, it is much more important to ensure that they are secure from everybody -- even at the cost of law enforcement access­ -- than it is to allow access at the cost of security. Barr is wrong, it kind of is like these systems are protecting nuclear launch codes.
encryption  government  security  analysis  blog 
august 2019 by danesparza
With warshipping, hackers ship their exploits directly to their target’s mail room | TechCrunch
Why break into a company’s network when you can just walk right in — literally? Gone could be the days of having to find a zero-day vulnerability in a target’s website, or having to scramble for breached usernames and passwords to break through a company’s login pages. And certainly there will be no need to park outside a building and brute-force the Wi-Fi network password.
security  hardware  analysis  warshipping  hack  hacking 
august 2019 by danesparza
Supervisors Driven By Bottom Line Fail To Get Top Performance From Employees, Baylor Study Says | Media and Public Relations | Baylor University
Supervisors driven by profits could actually be hurting their coveted bottom lines by losing the respect of their employees, who counter by withholding performance, according to a new study led by Baylor University.
management  office  analysis  statistics 
july 2019 by danesparza
Here's What You Can Do About That Equifax Data Breach
Credit reporting agencies work differently from other data companies, so while you may never have dealt with Equifax, their servers were still likely to have your data.
equifax  security  analysis 
july 2019 by danesparza
Implementing Model-Agnosticism in Uber’s Real-Time Anomaly Detection Platform
Here, we discuss how we rolled out model-agnosticism for our existing anomaly detection platform, leading to more robust and extensible real-time alerting systems and an overall smoother on-call experience for engineers.
machinelearning  ai  data  monitor  monitoring  sysadmin  notification  analysis  analytics 
july 2019 by danesparza
Micro Frontends
Good frontend development is hard. Scaling frontend development so that many teams can work simultaneously on a large and complex product is even harder. In this article we'll describe a recent trend of breaking up frontend monoliths into many smaller, more manageable pieces, and how this architecture can increase the effectiveness and efficiency of teams working on frontend code. As well as talking about the various benefits and costs, we'll cover some of the implementation options that are available, and we'll dive deep into a full example application that demonstrates the technique.
frontend  development  analysis  javascript  service 
june 2019 by danesparza
Nines are not enough: meaningful metrics for clouds – the morning paper
When it comes to SLOs, the interests of the customer and the cloud provider are at odds, and so we end up with SLAs (Service Level Agreements) that tie SLOs to contractual agreements.
analysis  business  network  sysadmin  performance  metrics 
june 2019 by danesparza
Is High Quality Software Worth the Cost?
Summing all of this up: Neglecting internal quality leads to rapid build up of cruft This cruft slows down feature development Even a great team produces cruft, but by keeping internal quality high, is able to keep it under control High internal quality keeps cruft to a minimum, allowing a team to add features with less effort, time, and cost.
software  analysis  development  management  technology  debt 
may 2019 by danesparza
The Cloud Is Just Someone Else's Computer
If you'd also like to embark upon this project, you can get the same Partaker B18 box I did for $490 from Amazon, or $460 direct from China via AliExpress. Add memory and drive to taste, build it up, then check out who I can enthusiastically recommend for colocation, or the colocation provider of your choice.
cloud  development  hardware  hosting  server  comparison  analysis 
february 2019 by danesparza
Fire and Forget on ASP.NET
.NET 4.5.2 added a built-in way to queue background (a.k.a. “fire and forget”) work in ASP.NET. This post is a summary of the different techniques available today.  async  howto  development  best_practice  analysis  article 
october 2018 by danesparza
GopherCon 2018 - Implementing a Network Protocol in Go
An very detailed walkthrough of implementing a networking protocol (NDP in IPv6) in Go, with many, many code snippets.
golang  programming  network  networking  analysis  howto  presentation 
september 2018 by danesparza
NoSQL Data Modeling Techniques – Highly Scalable Blog
In this article I provide a short comparison of NoSQL system families from the data modeling point of view and digest several common modeling techniques. I would like to thank Daniel Kirkdorffer who reviewed the article and cleaned up the grammar. To  explore data modeling techniques, we have to start with a more or less systematic view of NoSQL data models that preferably reveals trends and interconnections. The following figure depicts imaginary “evolution” of the major NoSQL system families, namely, Key-Value stores, BigTable-style databases, Document databases, Full Text Search Engines, and Graph databases:
data  database  db  model  nosql  analysis  language  technology 
august 2018 by danesparza
New Russian Hacking Targeted Republican Groups, Microsoft Says - The New York Times
In a report scheduled for release on Tuesday, Microsoft Corporation said that it detected and seized websites that were created in recent weeks by hackers linked to the Russian unit formerly known as the G.R.U. The sites appeared meant to trick people into thinking they were clicking through links managed by the Hudson Institute and the International Republican Institute, but were secretly redirected to web pages created by the hackers to steal passwords and other credentials.
microsoft  security  analysis  article 
august 2018 by danesparza
Why Trump Supporters Don’t Care About Cohen’s Admission - The Atlantic
What the president’s supporters fear most isn’t the corruption of American law, but the corruption of America’s traditional identity.
politics  article  analysis 
august 2018 by danesparza
speedscope - Interactive Flamegraph Explorer
For the past 9 months, I’ve been working on speedscope: a fast, interactive, web-based viewer for large performance profiles. You can use it live at, and read the code on GitHub at jlfwong/speedscope. It’s inspired by the performance panel of Chrome developer tools and by Brendan Gregg’s FlameGraphs. If you’ve never heard of flamegraphs before or have heard of them but never understood how to read them, the guide “Using flamegraphs” from rbspy’s documentation is wonderful.
cool  performance  analysis  tool  chrome  development  debug  debugging  flame  graphs  graph 
august 2018 by danesparza
The Flame Graph - ACM Queue
Flame graphs can be generated from the output of many different software profilers, including profiles for different resources and event types. Starting with CPU profiling, this article describes how flame graphs work, then looks at the real-world problem that led to their creation.
debugging  visualization  howto  documentation  analysis 
august 2018 by danesparza
Health Checks and Graceful Degradation in Distributed Systems
As often as not, discussions around the implementation of a health check pivot around the two options at either extremity of the spectrum — simple pings/signals or comprehensive end-to-end tests. In this post, I aim to underscore the problem behind using the aforementioned form of health-checks for certain types of load balancing decisions as well as need for a more fine-grained approach for measuring the health of a process.
distributed  kubernetes  monitoring  analysis  monitor 
august 2018 by danesparza
How Does Make Money? • Aaron Parecki
So how can this company afford to connect all these calls for free? Turns out it's because they get kickbacks from rural carriers on the high carrier interconnect tariffs that the government allows them to charge.
business  analysis 
august 2018 by danesparza
Traffic Shaper — Configuring Traffic Shaping | pfSense Documentation
Traffic Shaping and queuing in pfSense can be accomplished in several ways. The easiest to implement is ALTQ-based shaping with the Traffic Shaping Wizard.
pfsense  traffic  shaping  network  analysis  bandwidth  sysadmin 
july 2018 by danesparza
Metrics vs. Logs Dilemma: Selecting the Right Platform for Monitoring Your Cloud Services (part 3 of 3) - Wavefront by VMware
Let’s start with a comparative analysis of logs vs. metrics, summarized in the figure below. Both metrics and logs can be used to drive actionable insight, and both can be searched. But as metrics are numbers, their compression rate is much higher than logs that represent text records. Given that, metrics can be stored, processed and retrieved at a fraction of a cost compared to logs (up to 10x).
metrics  logging  analysis  blog  article 
april 2018 by danesparza
High Quality Audio with I2S - Part 1
In this chapter, we will be making some noise!  Audio generation was something that I found difficult to understand and implement in my first embedded design.  For whatever reason, I could not find many examples to help me create loud and clear audio with an MCU.  Things can get complicated really fast with new terminology, and everything seems to be written for an expert, but I figured it out for the most part and I will share my findings.
audio  i2s  sound  analysis  howto  electronics 
march 2018 by danesparza
Music and Computers
The most common tools used to perform Fourier analysis and synthesis are called the fast Fourier transform (FFT) and the inverse fast Fourier transform (IFFT). The FFT and IFFT are optimized (very fast) computer-based algorithms that perform a generalized mathematical process called the discrete Fourier transform (DFT). The DFT is the actual mathematical transformation that the data go through when converted from one domain to another (time to frequency). Basically, the DFT is just a slow version of the FFT—too slow for our impatient ears and brains!
audio  tutorial  fft  fastfourier  sound  analysis 
march 2018 by danesparza
The Last Conversation You’ll Need to Have About Eating Right
We offered friends, readers, and anyone else we encountered one simple request: Ask us anything at all about diet and nutrition and we will give you an answer that is grounded in real scientific consensus, with no “healthy-ish” chit-chat, nary a mention of “wellness,” and no goal other than to cut through all the noise and help everyone see how simple it is to eat well. Here, then, are the exhaustively assembled, thoroughly researched, meticulously detailed answers to any and all of your dietary questions.
advice  food  health  nutrition  analysis  medical  help  best_practice  statistics 
march 2018 by danesparza
Here are the top states and cities for startups in the South | TechCrunch
The American South may not be the first region that comes to mind when you hear the phrase “hotbed of tech entrepreneurship,” but, slightly misguided perceptions aside, it’s home to a diverse and growing collection of startups.
georgia  startup  startups  analysis  statistics 
march 2018 by danesparza
Gospel contents - Wikipedia
The gospels are memories of the deeds and words of Jesus. The four narratives share a story in which the earthly career of Jesus culminates in his death and resurrection, an event of crucial redemptive significance. The four are inconsistent in detail. John and the three synoptics relate the same basic story-line, but within this overall framework they present completely different pictures of Jesus' career.
religion  analysis  reference 
march 2018 by danesparza
Troy Hunt: I Wanna Go Fast: Why Searching Through 500M Pwned Passwords Is So Quick
In the immortal words of Ricky Bobby, I wanna go fast. When I launched Pwned Passwords V2 last week, I made it fast - real fast - and I want to talk briefly here about why that was important, how I did it and then how I've since shaved another 56% off the load time for requests that hit the origin. And a bunch of other cool perf stuff while I'm here.
blog  security  performance  database  cache  caching  network  best_practice  analysis 
february 2018 by danesparza
Fail-slow at scale: evidence of hardware performance faults in large production systems | the morning paper
One of the conclusions is that many modern deployed systems do not anticipate this failure mode. The authors offer a set of suggestions to hardware vendors, operators, and systems designers to improve the state of affairs.
hardware  sysadmin  programming  development  analytics  analysis  best_practice  performance  debug  debugging 
february 2018 by danesparza
Why I don't use my real photo when messaging with customers on my website · Kapwing Blog
I’m a 24-year-old female web developer and founder of Kapwing, an early-stage software startup. When my co-founder, Eric, and I launched the website in October, we decided to add a chat messenger so that users could message us directly with feedback, feature requests, and bugs. In this post, I’ll tell the story of how user responses changed when we changed the photo and gender of our website’s customer support agent.
chat  sexism  metoo  computer  computers  internet  gender  analysis  statistics 
february 2018 by danesparza
How One Jira Ticket Made My Employer $1MM/Month: 7 Metrics that Actually Matter
I spent the first half of my career consulting with all kinds of businesses on how to leverage digital presence (meaning apps and websites) to move core business KPIs. My sales pitch was simple: Put me 100% in charge of the engineering org, and I’ll measurably improve the bottom line, or you don’t pay.
agile  jira  metrics  programming  best_practice  startup  startups  analysis 
february 2018 by danesparza
12 best practices for user account, authorization and password management
Account management, authorization and password management can be tricky. For many developers, account management is a dark corner that doesn't get enough attention. For product managers and customers, the resulting experience often falls short of expectations.
authentication  authorization  google  password  security  best_practice  analysis  development  startup 
february 2018 by danesparza
"Why you should pick strong consistency, whenever possible" - Google
Do you like complex application logic? We don’t either. One of the things we’ve learned here at Google is that application code is simpler and development schedules are shorter when developers can rely on underlying data stores to handle complex transaction processing and keeping data ordered. To quote the original Spanner paper, “we believe it is better to have application programmers deal with performance problems due to overuse of transactions as bottlenecks arise, rather than always coding around the lack of transactions.”1 Put another way, data stores that provide transactions and consistency across the entire dataset by default lead to fewer bugs, fewer headaches and easier-to-maintain application code.
database  google  best_practice  performance  analysis  code  programming  development 
january 2018 by danesparza
Google's Go beats Java, C, Python to programming language of the year crown | ZDNet
Google's Go language has been the focus of a huge rise in interest among developers, according to the long-running Tiobe Index.
golang  language  programming  analysis 
january 2018 by danesparza
Toyota’s Secret Weapon: Low Cost Car Factories - The Truth About Cars
For the first time in 30 years, I see people welding by hand. Someone is even putting a rotary sander to a primed body before it enters the paint station. If Ferdi Piech would see that in Wolfsburg, he would stop the line and fire the factory manager. Why less automation? More flexibility, lower investments.
business  cars  toyota  workplace  automation  automotive  article  analysis 
january 2018 by danesparza
Effect of vitamin D on gastrointestinal symptoms and health-related quality of life in irritable bowel syndrome patients: a randomized double-blind... - PubMed - NCBI
Over the 6-month intervention period, a significantly greater improvement in IBS symptoms such as abdominal pain and distention, flatulence, rumbling, and overall gastrointestinal (GI) symptoms (except dissatisfaction with bowel habits) was observed in the patients receiving vitamin D as compared to the placebo group
health  science  medical  healthcare  analysis 
january 2018 by danesparza
Robust Client-Side JavaScript – A Developer’s Guide · molily
In this guide, we will investigate why JavaScript might fail and how to prevent or handle these errors in a graceful way that ensures a working website.
javascript  programming  analysis  help 
january 2018 by danesparza
Don’t Equate Story Points to Hours
I’ve been quite adamant lately that story points are about time, specifically effort. But that does not mean you should say something like, “One story point = eight hours.” Doing this obviates the main reason to use story points in the first place. Story points are helpful because they allow team members who perform at different speeds to communicate and estimate collaboratively.
agile  scrum  best_practice  analysis 
january 2018 by danesparza
agile - Why use story points instead of hours for estimating? - Project Management Stack Exchange
After using hours to estimate our projects for a long time and rarely coming within 20% of actual "work-to-ship," I have been told by a handful of people that "points" work a lot better at gauging the complexity and estimated length of tasks within a project. How are story points better at estimating the work required for a project?
agile  scrum  best_practice  analysis 
january 2018 by danesparza
12 Common Mistakes Made When Using Story Points – Bynder Tech – Medium
I’ve heard many different explanations of what Story Points mean and how you should use them. This article aims to remove some of the mystery surrounding Story Points. I will also share the most common misconceptions I have encountered.
agile  scrum  best_practice  howto  analysis 
january 2018 by danesparza
Energy Density of 9V battery vs AA batteries - Bald Engineer
For this post, I’m going to break down the energy stored in a 9 V battery, the small rectangular kind and compare it to what you get with 6 AA batteries. Yes, it takes up a little more space, but you might be surprised by the difference.
energy  electrical  electronics  power  analysis 
december 2017 by danesparza
Guidelines and rules for GetHashCode | Fabulous adventures in coding
The trick is to trade a small amount of increased memory burden for a huge amount of increased speed. The idea is to make many shorter lists, called “buckets”, and then be clever about quickly working out which bucket we’re looking at
c#  code  analysis  development  programming  ideas  best_practice 
december 2017 by danesparza
Unit Testing Doesn't Affect Codebases the Way You Would Think
I’ve just wrapped up another study.  (The last one was about singletons, if you’re interested.) This time, I looked at unit testing and the impact it has on codebases. It didn’t turn out the way I expected.
architecture  programming  testing  analysis  unittesting  article  development  management 
november 2017 by danesparza
Scaling Up to Your First 10 Million Users
Cloud computing gives you a number of advantages, such as the ability to scale your web application or website on demand. If you have a new web application and want to use cloud computing, you might be asking yourself, "Where do I start?" Join us in this session to understand best practices for scaling your resources from zero to millions of users. We show you how to best combine different AWS services, how to make smarter decisions for architecting your application, and how to scale your infrastructure in the cloud.
aws  slideshow  advice  analysis  best_practice  sql  architecture  development  startup  startups 
november 2017 by danesparza
Insights into Sexism: Male Status and Performance Moderates Female-Directed Hostile and Amicable Behaviour
We show that lower-skilled players were more hostile towards a female-voiced teammate, especially when performing poorly. In contrast, lower-skilled players behaved submissively towards a male-voiced player in the identical scenario. This difference in gender-directed behaviour became more extreme with poorer focal-player performance
games  science  gender  analysis  psychology  article  management 
november 2017 by danesparza
Disabling Intel AMT on Windows (and a simpler CVE-2017-5689 Mitigation Guide)
It gets worse. Much worse. If your Windows laptop runs #IntelAMT, and you enable #WiFi for AMT and you connect to public WiFi AMT is accessible to anyone on that network.
intel  security  sysadmin  network  best_practice  analysis  exploit  windows  linux 
november 2017 by danesparza
An Open Letter to Intel
Dear Mr. Krzanich, Thanks for putting a version of MINIX inside the ME-11 management engine chip used on almost all recent desktop and laptop computers in the world. I guess that makes MINIX the most widely used computer operating system in the world, even more than Windows, Linux, or MacOS. And I didn't even know until I read a press report about it. Also here and here and here and here and here (in Dutch), and a bunch of other places.
dev  hardware  sysadmin  security  unix  intel  network  exploit  analysis 
november 2017 by danesparza
“One Damn Slide After Another”: PowerPoint at Every Occasion for Speech : Computational Culture
No one gained as much mileage out of critiquing PowerPoint as Edward Tufte. The maven of lucid visualizations charged the program with destroying “the capacity for sustained, critical thought.”12 PowerPoint stacks information in time, forcing audiences to think sequentially rather than comparatively. Visual reading “works more effectively when relevant information is shown side by side. Often the more intense the detail, the greater the clarity and understanding.”13 PowerPoint prevents detailed comparisons between slides and makes it impossible to trace relationships between parts and wholes. When you consider the consequences of impaired analytical reasoning in mission critical situations the implications become troublingly apparent.
powerpoint  slideshow  software  article  criticism  analysis 
november 2017 by danesparza
Sickness absence associated with shared and open-plan offices--a national cross sectional questionnaire survey. - PubMed - NCBI
Occupants sharing an office and occupants in open-plan offices (>6 occupants) had significantly more days of sickness absence than occupants in cellular offices.
health  workplace  business  office  startup  startups  statistics  analysis 
september 2017 by danesparza
How to Buy a Kitchen Refrigerator
Visit our Resource Center to easily find and filter hundreds of Videos, Buying Guides and Checklists
blog  home  appliances  shop  shopping  research  analysis 
september 2017 by danesparza
The software engineering rule of 3
Here’s a dumb rule I’m postulating* for software engineering projects: you need at least 3 examples before you solve the right problem.
architecture  programming  software  development  analysis 
august 2017 by danesparza
I Built A Bot To Apply To Thousands Of Jobs At Once–Here’s What I Learned | Fast Company
So where has this left me, aside from somewhat disheartened? Well, for one thing, it leaves me a little bit wiser. As my faith in the front-facing application process eroded into near oblivion, I learned three lessons by robotically applying to thousands of jobs: It’s not how you apply, it’s who you know. And if you don’t know someone, don’t bother. Companies are trying to fill a position with minimal risk, not discover someone who breaks the mold. The number of jobs you apply to has no correlation to whether you’ll be considered, and you won’t be considered for jobs you don’t get the chance to apply to.
hiring  jobs  analysis  automation  article 
march 2017 by danesparza
« earlier      
per page:    204080120160

Copy this bookmark:

to read