Today we start with a story from WIRED about the NSA firmware hacking. I have tried to avoid the hysteria and WIRED has a nicely detailed post. DaedTech, whose posts are normally development related, has a great post on the “retreat of the introvert”. I am sure that most of us will relate to this. Also, take a look at the advanced section below. Three great posts today, one about optimizing A*, another regarding log structured merge trees and a third about finding the maximum result of a multiplication using 5 digits.
As always, enjoy today’s items, and please participate in the discussions on these sites.
Top Stories
- The Retreat of the Introvert | DaedTech
- How the NSA’s Firmware Hacking Works and Why It’s So Unsettling | WIRED
Career and Process
- Scrum Teams, “PURIFFY” your Sprint Increment! | Architects Zone
- Ways of Expressing Estimates | Javalobby
- Velocity: Metrics that Encourage Safe Deployment | Atomic Energy
- Experience Report: Weak Code Ownership | Jay Fields’ Thoughts
Development
- My First LLVM Compiler | Wilfred Hughes
- On Rust and Nim | andreaferretti
- Automated System testing and the story of the hidden phallus | On software efficiency
- Reloadable properties file with Spring using Apache Commons Configuration | Java Code Geeks
- Using Go To Build a REST Service on Top of MongoDB | Javalobby
- Redirecting All Kinds of stdout in Python | Python Zone
- 1 to 1 relationships and subresources in REST APIs | Lyst Engineering
- Designing Fail-Fast Error Handling | Underscore
- How fast is logging? | OptaPlanner
AI, Machine Learning, Research and Advanced Algorithms
- Optimizing A* for grid maps | Blobs in Games
- Mrs. Nguyen’s prestidigitation | bit-player
- Log Structured Merge Trees | benstopford.com
Big Data, Visualization, SQL and NoSQL
- –
- Cassandra: Intro to Designing Tables Access, Query and so on. | Architects Zone
- Even Doctors Will Be Data Scientists | Java Code Geeks
- Multi-threaded replication with MySQL 5.6: Use GTIDs! | Javalobby
Infrastructure, Operations and DevOps
Security, Encryption and Cryptography
- Interesting CSRF bypass | Internetwache
- Samba vulnerability (CVE-2015-0240) | Red Hat Security
Link Collections
- Dew Drop – February 23, 2015 (#1960) | Morning Dew