You've possibly just found out you're in a data breach. The organisation involved may have contacted you and advised your password was exposed but fortunately, they encrypted it. But you should change it anyway. Huh? Isn't the whole point of encryption that it protects data when exposed to unintended parties?
This is a story of how a software company was able to start a conversation with 8x more of their users by cutting the length of their emails by 90%. You could set up a test of this method in less than an hour.
Do you actually use algorithms and data structures on your day to day job? I've noticed a growing trend of people assuming algorithms are pointless questions that are asked by tech companies purely as an arbitrary measure. I hear more people complain about how all of this is a purely academic exercise. This notion was definitely popularized after Max Howell, the author of Homebrew, posted his Google interview experience:
Google: 90% of our engineers use the software you wrote (Homebrew), but you can’t invert a binary tree on a whiteboard so fuck off.
Short walk through Vim's origins and why is Vim so popular today.
Maersk is the world’s largest integrated shipping and container logistics company. I was massively privileged (no pun intended) to be their Identity & Access Management (IAM) Subject Matter Expert (SME), and later IAM Service Owner. Along with tens (if not hundreds) of others, I played a role in the recovery and cybersecurity response to the […]
After receiving a trove of documents from the whistleblower, I found myself under surveillance and investigation by the U.S. government.
An online roster and genealogy of 8945 programming languages from the 18th century to the present, featuring 7,800 influence links and over 11,000 citations.
In Norway, way up by the Arctic circle, global warming is already affecting people and nature. Here's how.
Then some little smarty decided that the operating system shouldn’t have all the fun and that developers should be able to create exception conditions and use this new architecture themselves, and in what is likely one of the worst things to ever happen to software development until pair programming came along, extended the new architecture with throw
...
Speaking as a maintainer of Mercurial and an avid user of Python, I feel like the experience of making Mercurial work with Python 3 is worth sharing because there are a number of lessons to be learned.
This year I sent out quite a few proposals to the majority of mobile conferences in Europe. Some ignored me, the others replied with automated rejections. However, some accepted and it was fun. Here is what I've learned on the way.
A distanza di cinquant’anni dalla strage di Piazza Fontana, l’Italia è ancora sovrastata dalla stessa cappa di disinformazione: “la strategia della tensione” che, portata avanti dallo Stato o perlomeno da ampi settori dello Stato, avrebbe dovuto facilitare una “svolta a destra” della politica, fermando l’avanzata del PCI nel mondo bipolare della Guerra Fredda. La strage di Piazza Fontana fu invece l’inizio di una campagna destabilizzante contro l’Italia che, dalla Libia alla Somalia, stava guadagnando molte posizioni internazionali cavalcando il “terzomondismo”. Le bombe cessarono nei primi anni ‘90 perché, distrutti la Prima Repubblica e lo Stato imprenditore, non servivano più.
Thirty years ago, Cliff Stoll published The Cuckoo's Egg, a book about his cat-and-mouse game with a KGB-sponsored hacker. Today, the internet is a far darker place—and Stoll has become a cybersecurity icon.
I read this book when I was young. Still remember the atmosphere :-)
With more than one million copies in print, “The Art of Computer Programming” is the Bible of its field. “Like an actual bible, it is long and comprehensive; no other book is as comprehensive,” said Peter Norvig, a director of research at Google. After 652 pages, volume one closes with a blurb on the back cover from Bill Gates: “You should definitely send me a résumé if you can read the whole thing".
The original system study, the key innovations, and the forgotten heroes of the world’s first — and still greatest — global navigation satellite system. True history, told by the people who made it.
When my scientist colleagues and I invented the internet 50 years ago, we did not anticipate that its dark side would emerge with such ferocity — or that we would feel an urgent need to fix it.
Somewhere around 2014 I found an /etc/passwd file in some dumps of the BSD 3 source tree, containing passwords of all the old timers such as Dennis Ritchie, Ken Thompson, Brian W. Kernighan, Steve Bourne and Bill Joy.
At Open Source Technology Summit (OSTS) 2019, Josh Triplett, a Principal Engineer at Intel gave an insight into what Intel is contributing to bring the most loved language, Rust to full parity with C.
Steganography is the study and practice of concealing communication. It plays a different role to cryptography, with its own unique applications and strengths.
Kayaking & trekking in the beautiful Valsesia
Frustrated by programming language shortcomings, Guido van Rossum created Python. With the language now used by millions, Nick Heath talks to van Rossum about Python's past and explores what's next.
Why we decided to combine version control with CI, and the rise of the single application.
Great features are in store for those who truly learn the editor
For the past few years, I've been building and operating a large distributed system: the payments system at Uber. I've learned a lot about distributed architecture concepts during this time and seen first-hand how high-load and high-availability systems are challenging not just to build, but to operate as well.
Blog of Raph Levien.
Andresti mai in riva al fiume un caldo e afoso pomeriggio di giugno a farti assalire dalle zanzare… per partecipare a dei giochi di cui non sai neanche le regole, con un compagno di squadra che non conosci fino all’ultimo, a rischiare di chiamarti Cip e Ciop, se non addirittura Barbie e Ken, per poi concludere con un’ulteriore gioco a sorpresa dove però capisci fin da subito che potrebbe compromettere la tua dignità?!
On June 29, 2019, the FreeDOS Project turns 25 years old. That's a major milestone for any open-source software project! In honor of this anniversary, Jim Hall shares this look at how FreeDOS got started and describes its Linux roots.
Legendary investor, programmer, and Y Combinator co-founder Paul Graham once wrote that one of the best ways to come up with ideas for your next startup is to ask what product you wish someone else would make for you. For Stepan Pachikov, founder of Evernote, that product was a way to help him remember things. Although Pachikov first began working on what ultimately became Evernote back in 2002, his fascination with human memory stems from his experiences growing up in the former Soviet Union. To Pachikov, Evernote wasn't just another app or a way to capitalize on Silicon Valley's burgeoning
When it comes to using computers to steal money, few can come close to matching the success of Russian hacker Evgeniy Bogachev.
The $3 million bounty the FBI has offered for Bogachev’s capture is larger than any that has ever been offered for a cybercriminal—but that sum represents only a tiny fraction of the money he has stolen through his botnet GameOver ZeuS.1 At its height in 2012 and 2013, GameOver ZeuS, or GOZ, comprised between 500,000 and 1 million compromised computers all over the world that Bogachev could control remotely. For years, Bogachev used these machines to spread malware that allowed him to steal banking credentials and perpetrate online extortion.2 No one knows exactly how much money Bogachev stole from his thousands of victims using GOZ, but the FBI conservatively estimates that it was well over $100 million.
Vim 8 added a lot of much-needed functionality, and new community sites like VimAwesome have made plugin discovery and evaluation easier. I’ve been doing a lot more work with Vim lately and have spent some time configuring my workflow for peak efficiency, so here’s a snapshot of my current state, which includes:
fzf
and fzf.vim
for finding filesack.vim
and ag
for searching filesVim
+ tmux
is the key to victory 🔑ALE
is the new Syntastic
because it’s asynchronousThe developers behind World of Warcraft tell the story of its history, from the original beta to today.
The history and use of parentheses in programming languages, from the beginning of programming to the present day.
Early programming languages only had round parentheses, but later keyboards added brackets and braces.