Today we start with some good security articles. First, Reuters reports on US researchers showing how computers can be hijacked to send data using sound waves. Outside of the security implications, this is really cool stuff. The BBC has a good article on some spyware demo that shows how spooks hack mobile phones. This is not cool stuff and generally creepy from the privacy perspective. Some things are just way easier than they should be.
As always, enjoy today’s items, and please participate in the discussions on these sites.
Startups, Career and Process
- Break it down: decomposing user stories in JIRA | Atlassian Blogs
Design and Development
- Concatenative Editing | phfilip
- Collating repositories or grafting earlier history with Git | Atlassian Developers
- Production postmodern: Reading the errors | Ayende @ Rahien
- Pointer Events now in Firefox Nightly | Mozilla Hacks
- The Haskell User Experience | Rick Dzekman
- Choosing Smalltalk On Porpoise | Richard Eng
- Strictly Tagged Clojure | Reid McKenzie
- Working with maps in Python | Max Berggren
- Specification-based Test Design Techniques for Enhancing Unit Tests Part 1 | Making the Complex Simple
- Java 8’s Method References Put Further Restrictions on Overloading | Java Code Geeks
- A little golang way | AeroFS
- 6 reasons why pre is better than post production code review | GitLab
Concurrency, Performance and Scalability
- The difference between Efficiency and Performance – It’s not all about the Big O | Java Code Geeks
- How Do You Program A Computer With 10 Terabytes of RAM | High Scalability
- Allocation Adventures 3: The Buddy Allocator | bitsquid
- Making Netflix.com Faster | The Netflix Tech Blog
AI, Machine Learning, Research and Advanced Algorithms
- Playing with the largest known prime | John D. Cook
Big Data, Visualization, SQL and NoSQL
- Exploding poverty | Flowing Data
- Apache Kafka, Samza, and the Unix Philosophy of Distributed Data | confluent
Security, Encryption and Cryptography
- U.S. researchers show computers can be hijacked to send data as sound waves | Reuters
- Spyware demo shows how spooks hack mobile phones | BBC News
Link Collections
- Double Shot #1534 | A Fresh Cup
- The Daily Six Pack: August 6, 2015 | Dirk Strauss