My first encounter with docker goes back to early 2015. Docker was experimented with to find out whether it could benefit us. At the time it wasn’t possible to run a container [in the background] and there wasn’t any command to see what was running, debug or ssh into the container.
Beware of the .NET HttpClientIn the old days of .NET (pre 4.5) sending a HTTP request to a server could be accomplished by either using the WebClient or at a much lower level via the HttpWebRequest. In 2009 and as part of the REST Starter Kit (RSK) a new abstraction was born called the HttpClient; It took until the release of .
Pex and MolesCode Digger for Visual Studio 2012 and 2013 is a lightweight version of Pex that allows you to explore public .NET methods in Portable Class Libraries directly from the code editor. Under the hood, Code Digger uses the Pex engine.
Ultimate DB Heresy: Single DB Connection. Part I. Performance (Part II. Scalability to follow)[[This is Chapter XVII(d) from “beta” Volume 2 of the upcoming book “Development&Deployment of Multiplayer Online Games”, which is currently being beta-tested.
UTF-8 EverywhereOur goal is to promote usage and support of the UTF-8 encoding and to convince that it should be the default choice of encoding for storing text strings in memory or on disk, for communication and all other uses.
Reflections on REST API design with Swagger. REST’s accidental complexity.Reflections on REST API design with Swagger. REST’s accidental complexity.Over the last year we built a service and we used Swagger / openAPI to define the API in machine readable format.The YAML spec of the API is the main contract of our service.
How I Became HackerRank #1 In Two HoursMy ranking on Hacker Rank is #1 for Java programming and it only took me two hours. For every question on the HackerRank site, there is a discussion area. In the discussion area are the answers for the questions; often posted by moderators of the site.
6 encryption mistakes that lead to data breachesAs you can see, a massive amount of data security responsibilities are shouldered upon you. And this is true of any cloud provider. Protecting your sensitive data with low-level encryption solutions such as disk or file encryption can seem like a tempting one-click-fix.
BedrockBedrock is a simple, modular, WAN-replicated data foundation for global-scale applications. Taking each of those in turn:
"The Linux Kernel Hidden Inside Windows 10" techtalk by Alex Ionescu"The Linux Kernel Hidden Inside Windows 10" techtalk by Alex Ionescu at BlackHat USA 2016Slides for the presentation https://github.com/ionescu007/lxss/bl...Other videos from BlackHat USA 2016 https://www.youtube.com/playlist?list...
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.