recentpopularlog in

whip_lash : engineering   12

An Overview Of Computer Science Concepts For Engineers
 Various theoretical topics will be mentioned, but particular emphasis will be placed on those topics which are especially relevant in today's job market.  This article is optimized for people who are already very technical, mathematical and fast learning.  This article is not intended to teach you any of these topics, but instead to let you know that they exist and explain why they are important so you can go learn them on your own.
compsci  computer-science  computerscience  engineering  learning  programming 
7 weeks ago by whip_lash
The Systems Thinker – A Lifetime of Systems Thinking - The Systems Thinker
Improving the performance of the parts of a system taken separately will necessarily improve the performance of the whole. False. In fact, it can destroy an organization, as is apparent in an example I have used ad nauseum: Installing a Rolls Royce engine in a Hyundai can make it inoperable.
design  engineering  systems  innovation  philosophy  problemsolving  management 
8 weeks ago by whip_lash
Engineering career development at Khan Academy | Khan Academy Engineering
We’ve previously shared our Engineering Principles. Today we’re releasing our Engineering Career Development guide.
career  development  engineering 
july 2018 by whip_lash
"Reverse Engineering for Beginners" free book
Topics discussed: x86/x64, ARM/ARM64, MIPS, Java/JVM.

Topics touched: Oracle RDBMS, Itanium, copy-protection dongles, LD_PRELOAD, stack overflow, ELF, win32 PE file format, x86-64, critical sections, syscalls, TLS, position-independent code (PIC), profile-guided optimization, C++ STL, OpenMP, win32 SEH.
assembly  book  engineering  security  reverseengineering 
january 2018 by whip_lash
Operational Excellence in April Fools' Pranks - ACM Queue
Stack Overflow's 2017 prank, "Dance Dance Authentication," was both topical and absurdist.3 The prank was a blog post and accompanying demonstration video for Stack Overflow's new (fictional) authentication system. Rather than the usual 2FA (two-factor authentication) system that requires an authenticator app or key fob, this system required users to turn on their webcams and dance their password. This was topical because recent growth in 2FA adoption meant many Internet users were experiencing 2FA for the first time. It was absurdist because it took the added burden and nuisance of 2FA to an extreme. It revealed the truth that badly implemented security sacrifices convenience.
engineering  humor 
december 2017 by whip_lash
You Are Not Google – Bradfield
Don’t even start considering solutions until you Understand the problem. Your goal should be to “solve” the problem mostly within the problem domain, not the solution domain.
eNumerate multiple candidate solutions. Don’t just start prodding at your favorite!
Consider a candidate solution, then read the Paper if there is one.
Determine the Historical context in which the candidate solution was designed or developed.
Weigh Advantages against disadvantages. Determine what was de-prioritized to achieve what was prioritized.
Think! Soberly and humbly ponder how well this solution fits your problem. What fact would need to be different for you to change your mind? For instance, how much smaller would the data need to be before you’d elect not to use Hadoop?
architecture  engineering  technology 
august 2017 by whip_lash
Adding a New Disk to an Existing Windows 2008 Cluster - Ask the Core Team - Site Home - TechNet Blogs
Adding new storage is a simple, reliable process that I thought I would show everyone. In this walk through, I already have a 2 node cluster. I am going to walk through adding a 1GB LUN as a new disk to an existing cluster.
microsoft  windows  cluster  sysadmin  engineering 
may 2012 by whip_lash

Copy this bookmark:





to read