There were a lot of development articles over the weekend. On Building Real Software, they talk about application security and the gaps between builders and defenders. Edmund Kirwan shows us a structural package analysis of Apache Lucene over the years.
As always, enjoy today’s items, and please participate in the discussions on these sites.
Startups, Career and Process
- A Product Person’s Perspective on Enterprise Selling | Andreessen Horowitz
- What is the Mission of a Software Developer? | Javalobby
Development
- Do Not Make this Mistake When Developing an SPI | Javalobby
- 10 Leading HTML5 Frameworks You’ll Find Hard to Miss | Javalobby
- It’s evolution, baby! Web animations from GIFs to CSS3 | Javalobby
- Testing an Angular Application: Angular JS and Spring Security Part VIII | Javalobby
- Apache Camel Wire Tap Examples | Java Code Geeks
- Struct composition with Go | Dave Cheney
- Revisiting the First Rule of Performance Optimisation: Effects of Escape Analysis | Java Code Geeks
- Generating Rust Bindings for Embedded Libraries | Atomic Object
- Appsec: The gaps between Builders and Defenders | Building Real Software
- Exact computation of sums and means | Radford Neal
- If Haskell were strict, what would the laziness be like? | Nikita Volkov
- Cleaning ThreadLocals | JavaSpecialists 229
- The structure of Apache Lucene | Edmund Kirwan
Concurrency, Performance and Scalability
- The Scale of Computing Latencies | Javalobby
- How We Spent Two Days Making Perl Faster | Booking.com blog
- Mechanical Sympathy: Understanding the Hardware Makes You a Better Developer | Javalobby
Big Data, Visualization, SQL and NoSQL
Enterprise and Web Content Management
- Adding new expressions to Blogger templates | Blogger Buzz
Infrastructure, Operations and DevOps
- Microservices Networking With Nirmata And Docker | Javalobby
- Immutable Infrastructure, hotdeploys, and the JVM | Java Code Geeks
- Infrastructure as a Code | Javalobby
Security, Encryption and Cryptography
- Hackers build a new Tor client designed to beat the NSA | The Daily Dot
- NSA in P/poly: The Power of Precomputation | Shtetl-Optimized
- Sniffing and tracking wearable tech and smartphones | Javalobby
- Spidering Techniques for Content Discovery | Yahoo Security
Link Collections
- WCF Open Source – The Daily Six Pack: May 22, 2015 | Dirk Strauss
- Dew Drop – May 22, 2015 (#2020) | Morning Dew
- Double Shot #1507 | A Fresh Cup