- antipope.org
-
Extreme Programming, a Reflection | 8th Lightblog.8thlight.com
We write beautiful web applications that are durable and free of defects in workmanship. - tools.ietf.org
- dgsiegel.net
-
The Logging Olympics - Log4J vs SLF4J simple vs Logback vs Java Util Logging vs LOG4J2 | Takipi Blogtakipiblog.com
A Race Between Today’s Top 5 Logging Frameworks - foldingair.blogspot.co.uk
-
I Got Myself Arrested So I Could Look Inside the Justice Systemtheatlantic.com
A former prosecutor fights the law and lets it win. -
The Law of Leaky Abstractions - Joel on Softwarejoelonsoftware.com
All abstractions fail sometimes. Don’t let them drag you and your programming down. -
Who Tried to Hack Your Microsoft Account? When, Where & Did They Succeed?7tutorials.com
How to learn whether your Microsoft account (or outlook.com email account) was hacked, when and from where. -
Why I create for the webblog.neave.com
The web is incredible. I love the web. In so many ways it has improved the lives of millions by transforming society, education, culture, community, and commerce. But the most amazing thing about the... -
Trojan.Skimer.18 infects ATMsnews.drweb.com
Russian anti-virus company Doctor Web is warning users about the Trojan program Trojan.Skimer.18. -
5 predictions on the future of databases (from a guy who knows databases)gigaom.com
Michael Stonebraker has helped create a lot of database systems and has lots of thoughts about where the industry is headed. Oracle, SAP, NoSQL, NewSQL — they all have a place if they play their cards right, but some might have a harder time than others. - pnnl.gov
-
The Right Stuff: Breaking the PageSpeed Barrier with Bootstrap | AppNetaappneta.com
Staring with Twitter Bootstrap and mod_pagespeed, how hard is it to get a perfect PageSpeed Insights score? Well…there is only one way to find out! - people.csail.mit.edu
- pipeline.corante.com
-
That Bomb-Hoaxing Harvard Student Was Using Tor, But They Caught Him Anywayonthemedia.org
Kim sent the threatening emails using a Tor browser, which anonymizes your web browsing, paired with an anonymous email program called Guerilla Mail. That actually could have been enough to protect his identity, except that he did all of this on Harvar... - antirez.com
- pxdojo.net
- cs.tau.ac.il