Skip to content
Permalink
main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time

Notes

Uber wasted $100 million on useless digital ad campaigns

Apple M1: Former Apple Engineer Explains Secrets of Success | Digital Trends

Learn Go in ~5mins

Go cheatsheet

How Bullet Lists Help Organize Your Ideas | Grammarly

Red Hat OpenShift supports both Windows and Linux containers | ZDNet

(5) Lesley Carhart on Twitter: "Just a few substantial infosec implications of the past week: - physical and digital threat landscape changes for hosting and social media providers and their employees and vendors / contractors - the need to model and review IR plans for physical building intrusions unilaterally" / Twitter

Scaling Cache Infrastructure at Pinterest - Pinterest Tech Stack

What Red Hat’s Purchase of StackRox Means for OpenShift Security and Observability – The New Stack

https://twitter.com/editingemily/status/1347689943640858625?s=12

Beaumont Health website crashes due to demand for COVID-19 vaccines

https://twitter.com/danrose999/status/1347677573900242944?s=12

Linux Hardware Reviews, Open-Source Benchmarks & Linux Performance - Phoronix

Some unlikely 2021 predictions [LWN.net]

A Look At The CPU Security Mitigation Costs Three Years After Spectre/Meltdown - Phoronix

Nine top tricks from Google’s productivity guru - Protocol

Post-Riot, the Capitol Hill IT Staff Faces a Security Mess | WIRED

Red Hat to acquire container security firm StackRox | ZDNet

16 Great Tech Blogs by Women and Why You Should Read Them

Want to Save the World? Start by Cutting Your Cloud Costs – The New Stack

Maximizing Developer Effectiveness

Nissan source code leaked online after Git repo misconfiguration | ZDNet

Lesser Known Techniques for Attacking AWS Environments - tl;dr sec

NSA releases “Eliminating Obsolete Transport Layer Security (TLS) Protocol Configurations” Cybersecurity Information > National Security Agency Central Security Service > Article View

Telegram feature exposes your precise address to hackers | Ars Technica

NVD - CVE-2020-10148

How to Tell Your Boss You’re Burned Out

Who’s at the Helm?. Or, how to deploy 25+ CVEs to prod in… | by Dan Lorenc | Jan, 2021 | Medium

USENIX: Jupyter Notebooks Could Help SREs Better Sleuth Incidents – The New Stack

Top Detroit Startups to Watch in 2021 | purpose.jobs

Rust Programming Language Tutorial – How to Build a To-Do List App

Productivity Is About Your Systems, Not Your People

8 tips for attending virtual conferences - {anonymous => 'hash'};

Raluca Saceanu: ‘The threat landscape is evolving at a dangerous pace’

Death of 22-year-old Pinduoduo employee renews controversy over China’s 996 overwork culture, sparking an investigation | South China Morning Post

Welcome to the splinternet – where freedom of expression is suppressed and repressed, and Big Brother is watching • The Register

Epic Games buys enormous shopping mall, will convert it to global HQ - Polygon

‎OBS Blade on the App Store

How we're helping our employees cope with the pandemic

Source Code Organization · microsoft/vscode Wiki

10 things they don't teach you about AWS - DEV Community 👩‍💻👨‍💻

Perovskite Solar Out-Benches Rivals in 2021 - IEEE Spectrum

6 Essential Things Web Developers Should Know About Marketing in 2021 | Hacker Noon

https://twitter.com/elissabeth/status/1345771177734791170?s=12