Happened from 2015-08-16 to 2015-08-23

Analyzing the health of Philadelphia’s bike share system

By Randy Olson on 2015-08-16

analysis, data visualization, bike share, Indego, machine learning, modeling, Philadelphia

Last month, I wrote about my initial attempts to model and predict the usage patterns of Indego, Philadelphia’s new bike share system. To recap: If you’ve ever used a bike share before, you know that one of the biggest fearsRead more ›

Original post

ClusterHQ and Weaveworks: Two startups making Docker production-ready

By Janakiram MSV on 2015-08-17

ClusterHQ's Flocker and Weaveworks' Weave add storage and networking capabilities to Docker. Get details on how the tools work with the container technology.

Original post

Cloud security: 10 things you need to know

By Conner Forrest on 2015-08-17

Is the cloud truly safe? Here's what you need to know about cloud security.

Original post

Agile For Non Developers

On 2015-08-17


Agile methodology is an alternative to traditional project management, typically used in software development. These methods of collaboration between self-organizing and cross-functional teams could be valid for other non software teams, or even your personal life.


Original post

U.S. college majors: Median yearly earnings vs. gender ratio

By Randy Olson on 2015-08-17

analysis, data visualization, college major, gender, pay gap

Last year, I looked at the gender ratios across college majors and discovered an interesting-yet-spurious correlation: College majors with higher male:female ratios (i.e., with more men than women) tend to have students with higher estimated IQs. After much debate, theRead more ›

Original post

Concurrency Control Strategies for Secret Agents

On 2015-08-17


In the 1963 movie "Dr. No," the first in the James Bond series, Bond travels to Jamaica for a case, and he knows that his enemies are watching his every move. He knows his enemies are smart, but he's smarter. To keep them from prying into his plans, he can't simply lock them out of his room, he needs to be a little more sly—as any reputable villain could surely pick a lock. So he places a hair on the door frame, knowing that in the sure event that his room is infiltrated while he's out, he'll see that the hair has moved and can abondon or change his plan if needed. It's a brilliant tactic, and saves him time, effort, and constraints on his travel that he'd incur by trying to securely lock down his room as he moves from place to place.

How would this scenario look in code? Well, let's introduce a secret mission, in Ruby:

class SecretMission
  def initialize
    @files = Array.new(5) { |i| "File #{i + 1}" }

  def read(name)
    while file = @files.shift
      puts "#{name} is reading #{file}"

Original post

#NoHacked: Identifying and Diagnosing Injected Gibberish URL Hacking

By Google Webmaster Central (noreply@blogger.com) on 2015-08-17

Today in our #NoHacked campaign, we’ll be discussing how to identify and diagnose a trending hack. Even if your site is not infected with this specific type of hack, many of these steps can be helpful for other types of hacks. Next week, we’ll be following up with a post about fixing this hack. Follow along with discussions on Twitter and Google+ using the #NoHacked tag. (Part 1, Part 2, Part 3)

Identifying Symptoms

Original post

Bliki: AlignmentMap

By Sriram Narayan on 2015-08-18


Alignment maps are organizational information radiators that help visualize the alignment of ongoing work with business outcomes. The work may be regular functionality addition or technical work such as re-architecting or repaying technical debt or improving the build and deployment pipeline. Team members use alignment maps to understand what business outcomes their day-to-day work is meant to improve. Business and IT sponsors use them to understand how ongoing work relates to the business outcomes they care about.

Here’s an example scenario (inspired by real life) that illustrates how these maps may be useful. A team of developers had inefficiently implemented a catalog search function as N+1 calls. The first call to the catalog index returned a set of SKU IDs. For each ID returned, a query was then made to retrieve product detail. The implementation came to the attention of an architect when it failed performance tests. He advised the team to get rid of the N+1 implementation.

“Search-in-one” was the mantra he offered the team as a way to remember their objective. Given the organizational boundary between architects and developers and the low frequency of communication between them, the mantra was taken literally. The team moved heaven and earth to implement a combined index query and detail query in a single call. They lost sight of the real objective of improving search performance and slogged away in an attempt to achieve acceptable performance in exactly one call. Funding ran out in a few months and after some heated discussions, the project was cancelled and the team disbanded.

The above example may seem absurd but sadly, enterprise IT is no stranger to architecture and business projects that are cancelled after a while because they lost sight of why they were funded in the first place. In the terminology of organizational design, these are problems of alignment.

Original post

Platform9 simplifies the challenge of running OpenStack on VMware infrastructure

By Keith Townsend on 2015-08-18

See how Platform9 takes the complexity out of integrating VMware vSphere and OpenStack with a managed service.

Original post

Do small businesses make more money with the cloud? New study says yes

By Conner Forrest on 2015-08-18

A new study by Exact and Pb7 Research suggests that small businesses that embrace the cloud can up their efficiency and profitability. Here are key takeaways.

Original post

Podcasts/talks. Emptying the queue (I)

By Eduardo Ferro Aldama (noreply@blogger.com) on 2015-08-18

agilidad, charlas, podcasts, Vida De informático

I have a long queue of interesting talks, so I'll post the talks links in small batches. Here come the first one.

Interesting Agile/Lean related talks:

Other development/systems related talks:

  • Protocols - The Glue for Applications  (Torben Hoffmann) Very interesting, distributed systems, fault tolerant and the desing process for this kinds of systems (full of advices from the Erlang community).
  • Keys to SRE (SREcon14)  (Ben Treynor) Good description about the term/role of SRE (from the google perspective).

Original post

Verismic redefines 'CMS' with its Cloud Management Suite

By Conner Forrest on 2015-08-19

Here's how startup Verismic is leveraging the power of the cloud to deliver its IT management suite faster and more efficiently.

Original post

Verizon puts 50,000 Docker containers to work on a massive IoT cluster

By Matt Asay on 2015-08-20

IoT is becoming real, but it demands serious infrastructure, as a peek inside Verizon's newest cloud shows.

Original post


Comments powered by Disqus