Seth Godin leads the day again with a post about entitlement and worthiness. Basically, don’t assume you are owed anything, you need to work at things in order to be rewarded. Troy Hunt talks about a large security breach at 000webhost that the company is trying to keep quiet. It is an interesting story and the details of how Troy validates the breach data makes for a very good read. Google Webmaster Central gives us some good information on tracking down sneaky mobile redirects for our sites. If you run a site, reading that blog is always a good idea.
As always, enjoy today’s items, and please participate in the discussions on these sites.
Startups, Career and Process
- Entitlement vs. worthiness | Seth Godin
Design and Development
- Don’t include configs in your git repos | Phil Eaton
- MVC 1.0 in Java EE 8: How to Work With Models | DZone Java
- Guava ImmutableCollections, Multimaps and Java 8 Collectors | DZone Java
- Relax. Everyone’s Code Rots | DZone Agile
- Use Netflix Servo API to Publish Hystrix Metrics and Custom Metrics to AWS CloudWatch | DZone Integration
- Arrows, Monads and Kleisli – part I | VirtusLab
- Balancing design simplicity, product complexity, and business growth | Why Design?
- Introduction to Apache Spark with Examples and Use Cases | Java Code Geeks
- Why every development team needs continuous delivery | Atlassian
- type folding in guile | wingolog
Concurrency, Performance and Scalability
- Diagnosing Memory Leaks in Java | DZone Java
Big Data, Visualization, SQL and NoSQL
- Why some NoSQL DBs will only let you perform transactions on a single data item | DBMS Musings
- Open-sourcing Pinterest MySQL management tools | Pinterest Engineering
- We need a statistically rigorous and scientifically meaningful definition of replication | KD Nuggets
- How Amazon Redshift is Opening Up Big Data to Growth Hackers, Marketers, and Other Light Quants | The Data Point
- Using AWS Lambda for Event-driven Data Processing Pipelines | Amazon AWS Big Data Blog
Security, Encryption and Cryptography
- Detect and get rid of unwanted sneaky mobile redirects | Google Webmaster Central
- Breaches, traders, plain text passwords, ethical disclosure and 000webhost | Troy Hunt
- Practical attacks against 4G (LTE) access network protocols | Secure Systems
Fun and Other stuff
Link Collections
- Double Shot #1575 | A Fresh Cup
- Dew Drop – October 29, 2015 (#2122) | Morning Dew