Donald Norman is often called the inventor of User Experience, and this review covers many important points from his seminal book.
Powered by 33 Million Code Completions: Codetrails Connect 1.2Tonight: James May writes "Hello, World!", Richard Hammond cleans up the mess and Clarkson does some shouting. When most people first try to apply good OO de...
Unit Testing and TDD: Why you should care and how to make it happenRoy Osherove spoke at the Siemens Healthcare Testing Conference. more info at http://5whys.com by Roy Osherove
opserver/Opserver · GitHubOpserver is a monitoring system by the team at Stack Exchange, home of Stack Overflow. It is a tool for monitoring: Known as “status” internally, Opserver provides a fast overall view of all our major systems that also allows drilling in for more detail.
Star Trek 1971 Text GameA Bit of History Two years after the original series was canceled in 1969, high school senior Mike Mayfield was busy keeping the Star Trek universe alive by feeding punched paper tape into a Sigma 7 in an effort to bring the crew of the Enterprise and the Klingon Empire to life on a 10 character-
No More Callbacks: 10,000 Actors, 10,000 Threads, 10,000 SpaceshipsI recently stumbled across this quote 1 by Doron Rajwan of Intel: “For the past 30 years, computer performance has been driven by Moore’s Law; from now on, it will be driven by Amdahl’s Law. Writing code that effectively exploits multiple processors can be very challenging.
Game Programming Patterns / Design Patterns Revisited / CommandI’m pumped about this chapter because Command is one of my favorite patterns. Most large programs I write, games or otherwise, end up using it somewhere. When I’ve used it in the right place, it’s neatly untangled some really gnarly code.
Capturing The Flag, SQLi-StylePenetration tester and long-time security professional Sumit "Sid" Siddharth is a big believer in the importance of practicing exploitation to gain better insight about vulnerabilities. "The only way you can understand the true impact of vulnerabilities is by practicing exploitation.
The NSA back door to NISTThomas C. Hales (University of Pittsburgh) Use once. Die once. — activist saying about insecure communication
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.