Friday Five #3

  1. How Recursion got into Programming – Comedy of Errors
  2. Myth of “Schema-less” – Interesting discussion sums it up as “schema-less doesn’t exist, it’s either in your database, or spread throughout the code”
  3. How the other half works : An adventure in the low Status of Software Engineers
  4. “A mathematician who can only generalise is like a monkey who can only climb up a tree, and a mathematician who can only specialise is like a monkey who can only climb down a tree” – Selected quotes from George Polya
  5. Know & Treat your biases 

Friday Five #2

  1. Soon, about 5% of Global energy demand will be from ‘networked devices’ waiting to be connected (e.g., cell phone lying idle)!

  2. Microsoft is The Very Antithesis of Strategy.
  3. #Java8 – ORM is dead, long live Functional-Relational Transformation – more intuitive, less annotations.
  4. Everyday Algorithms: Elevator Allocation
  5. World Cup Moments as 8-bit art

Friday Five #1

  1. Software Design Elegance – in 500 lines or less

 

“Every architect studies family homes, apartments, schools, and other common types of buildings during her training. Equally, every programmer ought to know how a compiler turns text into instructions, how a spreadsheet updates cells, and how a browser decides what to put where when it renders a page. This book’s goal is to give readers that broad-ranging overview, and while doing so, to help them understand how software designers think.”

 

  1. Visualizing Algorithms with Van Gogh

 

 

  1. Java 8 now allows ‘default’ method implementation in Interface. But it somehow managed to prevent multiple inheritance adding compile-time checks.

  2. Tweaking SQLLite to load 864,913 records in 16 seconds!!

 

  1. Brogrammers are changing programming culture.

 

State of Technology #106

Elsewhere

·        100 ideas for Computing

·       Unwritten Rules of Management

·        Summer Reading Issue from A List Apart

·        Product Strategy means saying No

·        Anil Dash’s 10 Rules of Internet

 

 

Architecture

The architecture of Twitter for 150M Active Users

 

Code

Continuous deployment at Quor

 

Design

Dan Norman’s ‘Design of Everyday Things’ course coming to Udacity this fall

 

Essay

Unofficial Guide to Rich Hickey’s Brain

 

Mobile

Why Mobile Apps are so slow

 

SaaS

NoSQL Data Modeling Techniques

 

Service

Early Amazon: Splitting the Website

 

Social

Six Types of Influencer Maps

 

Tool

Microsoft has 1 million servers!

 

Hack

Essays and Papers Every Programmers should Read

 

Etc

· Nicola Tesla pitching to Silicon Valley VCs      

·   Bret Victor on Engelbart    

Parting Thought

‘The past 30 years have been completely mundane. It’s all been scaling (of old technology) and Angry Birds’

 – Alan Kay

State of Technology #104

Elsewhere

 

 

Architecture

What’s new in JMS 2.0? Part 1: Ease of Use; Part 2: New Messaging Features

 

Code

Netflix Open Sources Zuul Edge Service

 

 

Design

2500 miles, 10 cities; 50 Design Problems in 50 Days

 

Essay

Silicon Valley and ‘Changing the World’

When financiers say that they’re doing God’s work by providing cheap credit, and oilmen claim to be patriots who are making the country energy-independent, no one takes them too seriously—it’s a given that their motivation is profit. But when technology entrepreneurs describe their lofty goals there’s no smirk or wink. “Many see their social responsibility fulfilled by their businesses, not by social or political action,” one young entrepreneur said of his colleagues. “It’s remarkably convenient that they can achieve all their goals just by doing their start-up.” 

 

Mobile

Data from WWDC – Apple has sent over 7.4 Trillion push notifications and others.

 

SaaS

Antifragile System Design Principles

 

Service

Future of Mobile Banking (Slides; Talk)

 

Social

Teens share a LOT on social media sites. 1 in 5 teens share mobile phone number online. Yet, only about 9% of them are concerned about privacy issues.

 

Tool

Linux Performance Analysis & Tools

 

Hack

Dashlane: An advanced Password Manager

 

Etc

  •         Lego Faces are getting angrier
  •         Every Business Cliché in a Single Memo

Parting Thought

“Reality is the second screen. Mobile is the first.” – Bob Bowman @MLB

 

State of Technology #102

elsewhere

 

Architecture

Anatomy of a Perfect Web Page

 

 

Code

Plain English Explanation of Big-Oand aCheat Sheet

 

Design

Design Principles for News Apps & Graphics

 

Essay

Letter to a Young Programmer Considering a Startup

 

Mobile

Are you designing your Mobile app following‘One Thumb, One Eyeball’ Principle?

 

SaaS

SSL/TLS Deployment Best Practices

 

Service

5 HTML5 Features that could Speed Things Up

 

Social

Most Popular Links Shared by Developers

 

Tool

45 ways to Communicate Two Quantities

 

 

Hack

Anatomy of a Hack: How Crackers Ransack Complex Passwords

 

Etc

Parting Thought

Zach is a 17 year old diagnosed with terminal cancer. He wants all to know‘you don’t have to find out how you’re dying to start living’.

State of Technology #100

Elsewhere

 

 

Architecture

Unhosted: “Serverless” SaaS Doctrine

 

 

Code

The Orange Algorithm Coke Uses

‘The Black Book model includes detailed data about the myriad flavors—more than 600 in all—that make up an orange, and consumer preferences. Those data are matched to a profile detailing acidity, sweetness, and other attributes of each batch of raw juice. The algorithm then tells Coke how to blend batches to replicate a certain taste and consistency, right down to pulp content.’

 

Design

6 Innovative Dashboards Worth Learning Forand Dashing – ‘The exceptionally handsome dashboard framework’.

 

 

Essay

Where’s _Why? Or, a Cultural History of Ruby.

‘The Little Coder’s Predicament arises from the following problem: We live in world of astonishingly advanced technologies, easy to use and all around us. Your grandmother has a smartphone. Your 2-year-old can play with an iPad. But the technology behind such marvels is complex and invisible, abstracted away from the human controlling it.’

 

Mobile

12 points are needed to uniquely identify a fingerprint. A new study published in Nature that  ONLY four ‘spatio-temporal points’ are needed to uniquely identify 95% individuals.

 

 

SaaS

Top 7 Startups from YC 2013 Demo Day

 

Service

How P&G Uses ‘Decision Cockpit’ for over 50,000 employee

 

Social

Is Bitcoin Global Economy’s Last Safe Haven?

 

Tool

Create Powerful Demo in Chrome

 

Hack

Google Maps: Treasure Hunt Mode

 

Etc


Parting Thought

“If you only read the books that everyone else is reading, you can only think what everyone else is thinking.” —Haruki Murakami

 

Follow

Get every new post delivered to your Inbox.