http://bradfrost.com/blog/post/atomic-web-design/
"In searching for inspiration and parallels, I kept coming back to chemistry. Solid, liquid, gas, simple, complex, etc, are atomic units that bonded together, form molecules.
Similarly, interfaces are made up of smaller components. This means we can break entire interfaces down into fundamental..."
Tags: #webdesign
"In searching for inspiration and parallels, I kept coming back to chemistry. Solid, liquid, gas, simple, complex, etc, are atomic units that bonded together, form molecules.
Similarly, interfaces are made up of smaller components. This means we can break entire interfaces down into fundamental..."
Tags: #webdesign
Brad Frost
Atomic Design
Hey there! I wrote a book called Atomic Design that dives into this topic in more detail, which you can buy as an ebook.
We’re not designing pages, we’re designing systems of components.—Stephen Hay
As the craft of Web design continues to evolve,…
We’re not designing pages, we’re designing systems of components.—Stephen Hay
As the craft of Web design continues to evolve,…
https://medium.com/unboxd/how-i-built-an-app-with-500-000-users-in-5-days-on-a-100-server-77deeb238e83#.12dy89f3b
Tags: #scalability
Tags: #scalability
Medium
How I built an app with 500,000 users in 5 days on a $100 server
There seems to be a general consensus in the world of startups that you should build an MVP (minimum viable product) without caring too…
https://www.linkedin.com/pulse/nodejs-vs-java-which-faster-apis-owen-rubel
Tags: #programming #webdev #java #nodejs #performance
Tags: #programming #webdev #java #nodejs #performance
LinkedIn
Node.Js vs Java : Which is Faster for API's?
This is something that I love to debunk because there is alot of HYPE out there around the popular javascript engine Node.js.
https://securelist.com/analysis/quarterly-malware-reports/75513/kaspersky-ddos-intelligence-report-for-q2-2016/
Tags: #security #ddos #report
Tags: #security #ddos #report
Securelist
Kaspersky DDoS Intelligence Report for Q2 2016
In Q2 2016, the geography of DDoS attacks narrowed to 70 countries, with China accounting for 77.4% of attacks. In fact, 97.3% of the targeted resources were located in just 10 countries. The longest DDoS attack in the second quarter of 2016 lasted for 291…
http://bigocheatsheet.com/
"Space and time complexities of common algorithm"
Tags: #algorithm #complexity
"Space and time complexities of common algorithm"
Tags: #algorithm #complexity
https://technologyconversations.com/2013/12/20/test-driven-development-tdd-example-walkthrough/
Tags: #programming #testing #tdd #java
Tags: #programming #testing #tdd #java
Technology Conversations
Test Driven Development (TDD): Example Walkthrough
Test-driven development (TDD) is a software development process that relies on the repetition of a very short development cycle: first the developer writes an (initially failing) automated test cas…
https://code.facebook.com/posts/218678814984400/scaling-mercurial-at-facebook/
Tags: #Mercurial #optimization #scalability
Tags: #Mercurial #optimization #scalability
Facebook Code
Scaling Mercurial at Facebook
With thousands of commits a week across hundreds of thousands of files, Facebook's main source repository is enormous--many times larger than even the Linux kernel, which checked in at 17 million lines of code and 44,000 files in 2013. Given our size and…
http://www.windowscentral.com/microsoft-will-pay-15000-if-you-find-remote-code-execution-issue-edge
Tags: #Microsoft #Edge
Tags: #Microsoft #Edge
Windows Central
Microsoft will pay up to $15,000 for finding a Remote Code Execution issue in Edge
Microsoft has announced an extension of its Bounty Programs that will offer security researchers up to $15,000 if they find a Remote Code Execution issue in the Microsoft Edge browser.
http://www.gizmodo.com.au/2016/08/def-con-researchers-hack-a-dell-monitor-to-show-whatever-pixels-they-want/
Exploit repo: https://github.com/redballoonshenanigans/monitordarkly
Tags: #security #exploit
Exploit repo: https://github.com/redballoonshenanigans/monitordarkly
Tags: #security #exploit
Gizmodo Australia
DEF CON Researchers Hack A Dell Monitor To Show Any Pixels They Want
Why should hackers bother with complicated cross-domain hacks or redirects when they can just change the pixels on your monitor? Because it's really hard and complicated, but not impossible, as one team at this year's DEF CON showed....
http://www.joelonsoftware.com/articles/fog0000000069.html
Tags: #software #programming #WorstPractices
Tags: #software #programming #WorstPractices
Joel on Software
Things You Should Never Do, Part I
Netscape 6.0 is finally going into its first public beta. There never was a version 5.0. The last major release, version 4.0, was released almost three years ago. Three years is an awfully long tim…