Are you over 18 and want to see adult content?
More Annotations
![A complete backup of milibrodeideas.com](https://www.archivebay.com/archive2/94b4f82e-de8c-4f52-9188-e735031930fd.png)
A complete backup of milibrodeideas.com
Are you over 18 and want to see adult content?
![A complete backup of podkarpackahistoria.pl](https://www.archivebay.com/archive2/25a95334-ee25-4ce9-ab7c-2c3d8eba2f68.png)
A complete backup of podkarpackahistoria.pl
Are you over 18 and want to see adult content?
![A complete backup of clearballistics.com](https://www.archivebay.com/archive2/7f366925-d1a4-405c-bfc1-a235b796d926.png)
A complete backup of clearballistics.com
Are you over 18 and want to see adult content?
![A complete backup of juegosjuegos.com](https://www.archivebay.com/archive2/3391505e-2e0c-48d5-98f5-85fb5b5e6fc1.png)
A complete backup of juegosjuegos.com
Are you over 18 and want to see adult content?
![A complete backup of thestrategybridge.org](https://www.archivebay.com/archive2/c6588122-e7c5-409c-a6b2-ad72e9aa375d.png)
A complete backup of thestrategybridge.org
Are you over 18 and want to see adult content?
![A complete backup of onepiece-streaming.com](https://www.archivebay.com/archive2/e4f3a38b-8e04-4cb1-b126-48a91f1456d6.png)
A complete backup of onepiece-streaming.com
Are you over 18 and want to see adult content?
Favourite Annotations
![A complete backup of meditierenlernen.com](https://www.archivebay.com/archive2/519f036c-0ce5-4106-a5a5-8961447b8fbc.png)
A complete backup of meditierenlernen.com
Are you over 18 and want to see adult content?
![A complete backup of somosgrupoepm.com](https://www.archivebay.com/archive2/eec89dc4-111a-461b-8bbb-b444c8a31db6.png)
A complete backup of somosgrupoepm.com
Are you over 18 and want to see adult content?
![A complete backup of jchristophers.com](https://www.archivebay.com/archive2/cf305597-41e1-4ed1-9125-6b07f72001ce.png)
A complete backup of jchristophers.com
Are you over 18 and want to see adult content?
![A complete backup of lectinblocker.com](https://www.archivebay.com/archive2/f825b6c6-1c8c-4c6d-9a58-bdf244e125ee.png)
A complete backup of lectinblocker.com
Are you over 18 and want to see adult content?
![A complete backup of centralmichigan-my.sharepoint.com](https://www.archivebay.com/archive2/7f9a18ca-537b-436d-b8c5-c9dccba8cc89.png)
A complete backup of centralmichigan-my.sharepoint.com
Are you over 18 and want to see adult content?
![A complete backup of homeandgarden.nl](https://www.archivebay.com/archive2/745e339b-bfbd-4128-8ea8-ff23cad54dc7.png)
A complete backup of homeandgarden.nl
Are you over 18 and want to see adult content?
Text
A SMALL, NICE THING
WHAT MAKES JERSEY INTERESTING: PARAMETER CLASSES Jersey is the reference implementation of JSR311, which is the Java community’s incredibly bureaucratic way of coming up with a decent API for writing RESTful web services. Despite the gray-flannel-suit feel to it, it’s actually a delight to work with. Broadly speaking, Jersey maps resources to classes, and HTTP verbs to methods.CODAHALE.COM
Redirecting to https://codahale.com/projects.html WHAT MAKES JERSEY INTERESTING: INJECTION PROVIDERS 16 May 2009. Ok, let’s get back to the geeky stuff. Another interesting thing about Jersey (in addition to parameter classes) is the way it uses dependency injection. Jersey doesn’t have an abstract base class for resources, like Rails’ ActionController::Base or Restlet’s Resource.This removes the obvious way of retrieving information about the incoming request: fromthe base class.
HOW NOT TO FIX A SECURITY BUG 14 Jun 2009 November 25th, 2008. Tadayoshi Funaba opens Bug #794 in the Ruby Issue Tracking System describing a segmentation fault when huge decimal strings are converted into BigDecimal instances. November 26th, 2008. Matz closes Bug #794 with r20359 to Ruby 1.9’s trunk. November 27th, 2008 to June 2nd, 2009. Every site running Ruby 1.8.x which creates BigDecimalTHESE ARE SLIDES.
These are slides. Which means they’re the visual accompaniment to an actual talk. They contain a fraction of the information I actually talked about, so scrolling through them can reallyCODAHALE.COM
Modern symmetric encryption is built around Authenticated Encryption with Associated Data (AEAD) constructions: combinations of ciphers and message authentication codes which provide strong guarantees of both confidentiality and integrity. CODA HALE WRITES THINGS. On The Difficulty Of Conjuring Up A Dryad 17 May 2017. The Happy Genius Of My Household 16 May 2017. On Containers 30 Aug 2016. Fan-In 01 Feb 2016. A Small, Nice Thing 30 Jan 2016. The Rest Of The Story 29 Nov 2011. You Can’t Sacrifice Partition Tolerance 07 Oct 2010. How To Safely Store A Password 31 Jan 2010. FOSS and Male Privilege 27 Aug ABOUT | CODAHALE.COM about. I’m a programmer who lives in Fort Collins, CO. If you need to get ahold of me, shoot me an email at coda.hale@gmail.com . I’m not interested in job/investment opportunities or debating things, but I’m always interested in hearing from old friends. Here’s some of the things I’ve done. CONTACT | CODAHALE.COM Coda Hale { writing, projects, about, contact} contact. You can email me at coda.hale@gmail.com. © 2009-2020 Coda Hale 2020 Coda HaleA SMALL, NICE THING
WHAT MAKES JERSEY INTERESTING: PARAMETER CLASSES Jersey is the reference implementation of JSR311, which is the Java community’s incredibly bureaucratic way of coming up with a decent API for writing RESTful web services. Despite the gray-flannel-suit feel to it, it’s actually a delight to work with. Broadly speaking, Jersey maps resources to classes, and HTTP verbs to methods.CODAHALE.COM
Redirecting to https://codahale.com/projects.html WHAT MAKES JERSEY INTERESTING: INJECTION PROVIDERS 16 May 2009. Ok, let’s get back to the geeky stuff. Another interesting thing about Jersey (in addition to parameter classes) is the way it uses dependency injection. Jersey doesn’t have an abstract base class for resources, like Rails’ ActionController::Base or Restlet’s Resource.This removes the obvious way of retrieving information about the incoming request: fromthe base class.
HOW NOT TO FIX A SECURITY BUG 14 Jun 2009 November 25th, 2008. Tadayoshi Funaba opens Bug #794 in the Ruby Issue Tracking System describing a segmentation fault when huge decimal strings are converted into BigDecimal instances. November 26th, 2008. Matz closes Bug #794 with r20359 to Ruby 1.9’s trunk. November 27th, 2008 to June 2nd, 2009. Every site running Ruby 1.8.x which creates BigDecimalTHESE ARE SLIDES.
These are slides. Which means they’re the visual accompaniment to an actual talk. They contain a fraction of the information I actually talked about, so scrolling through them can reallyCODAHALE.COM
Modern symmetric encryption is built around Authenticated Encryption with Associated Data (AEAD) constructions: combinations of ciphers and message authentication codes which provide strong guarantees of both confidentiality and integrity. CODA HALE WRITES THINGS. On The Difficulty Of Conjuring Up A Dryad 17 May 2017. The Happy Genius Of My Household 16 May 2017. On Containers 30 Aug 2016. Fan-In 01 Feb 2016. A Small, Nice Thing 30 Jan 2016. The Rest Of The Story 29 Nov 2011. You Can’t Sacrifice Partition Tolerance 07 Oct 2010. How To Safely Store A Password 31 Jan 2010. FOSS and Male Privilege 27 Aug ABOUT | CODAHALE.COM Coda Hale { writing, projects, about, contact} about. I’m a programmer who lives in Fort Collins, CO. If you need to get ahold of me, shoot me an email at coda.hale@gmail.com.I’m not interested in job/investment opportunities or debating things, but I’m always interested in hearing from old friends. PROJECTS | CODAHALE.COM The Programming Ape. Humans, you may have noticed, are not exactly rational. And yet here we are, trying to get them to build software. It’s a bit of a mess. But there is some good news: by drawing on modern theories of human cognition we can begin to optimize our tools for how people think, not how computers work.WORK IS WORK
Point-to-point communication (i.e., talking to each other) can be modeled as the activation of a subset of those dyads. While some organizations are chattier than others, this communication is essential for the sharing of information and the coordination ofaction. But
USL4J AND YOU
The Universal Scalability Law. The Universal Scalability Law, developed by Neil J. Gunther, is a model which combines Amdahl’s Law and Gustafson’s Law to produce a nonlinear model which can be used to predict a system’s behavior: X ( N) = λ N 1 + σ ( N − 1) + κN ( N − 1)
HOW TO SAFELY STORE A PASSWORD 31 Jan 2010 Use bcrypt. Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.. Why Not {MD5, SHA1, SHA2, SHA3, etc}? These are all general purpose hash functions, designed to calculate a digest of huge amounts of data in as short a time as possible. This means that they are fantastic for ensuring the integrity of data and utterly rubbish for THE HAPPY GENIUS OF MY HOUSEHOLD The Happy Genius Of My Household. In which clouds are considered. This article was originally posted on blog.skyliner.io on Aug 29, 2016. When viewed from one angle, we’re in the middle of an infrastructure software renaissance: a cornucopia of distributed databases, self-healing meshes, and software-defined anythings, all radiatingwith
FAN-IN | CODAHALE.COM Fan-In. In which attention is lensed. 01 Feb 2016. For a long time, my go-to question when interviewing a candidate was about building Twitter. I was looking to see how they thought about scalability and so, in classic programming interview cargo cult style, I would try to lead the candidate down the road of designing a system which could YOU CAN’T SACRIFICE PARTITION TOLERANCE You Can’t Sacrifice Partition Tolerance. In which there are limits to the CAP conjecture. 07 Oct 2010. I’ve seen a number of distributed databases recently describe themselves as being “CA” –that is, providing both consistency and availability while not providing partition-tolerance. To me, this indicates that thedevelopers of these
VIRTUAL MACHINES ARE FLEETING THINGS 18 May 2017. This article was originally posted on blog.skyliner.io on Feb 23, 2017. Last month, AWS sent us an email regretfully informingus that the
CONTACT | CODAHALE.COM Coda Hale { writing, projects, about, contact} contact. You can email me at coda.hale@gmail.com. © 2009-2020 Coda Hale 2020 Coda HaleA SMALL, NICE THING
TOWARDS A SAFER FOOTGUN Towards A Safer Footgun. In which encryption's splash damage is somewhat nerfed. 08 Jun 2017. Modern symmetric encryption is built around Authenticated Encryption with Associated Data (AEAD) constructions: combinations of ciphers and message authentication codes which provide strong guarantees of both confidentiality andintegrity.
USL4J AND YOU
The Universal Scalability Law. The Universal Scalability Law, developed by Neil J. Gunther, is a model which combines Amdahl’s Law and Gustafson’s Law to produce a nonlinear model which can be used to predict a system’s behavior: X ( N) = λ N 1 + σ ( N − 1) + κN ( N − 1)
CODAHALE.COM
Redirecting to https://codahale.com/projects.html WHAT MAKES JERSEY INTERESTING: PARAMETER CLASSES Jersey is the reference implementation of JSR311, which is the Java community’s incredibly bureaucratic way of coming up with a decent API for writing RESTful web services. Despite the gray-flannel-suit feel to it, it’s actually a delight to work with. Broadly speaking, Jersey maps resources to classes, and HTTP verbs to methods. WHAT MAKES JERSEY INTERESTING: INJECTION PROVIDERS 16 May 2009. Ok, let’s get back to the geeky stuff. Another interesting thing about Jersey (in addition to parameter classes) is the way it uses dependency injection. Jersey doesn’t have an abstract base class for resources, like Rails’ ActionController::Base or Restlet’s Resource.This removes the obvious way of retrieving information about the incoming request: fromthe base class.
HOW NOT TO FIX A SECURITY BUG 14 Jun 2009 November 25th, 2008. Tadayoshi Funaba opens Bug #794 in the Ruby Issue Tracking System describing a segmentation fault when huge decimal strings are converted into BigDecimal instances. November 26th, 2008. Matz closes Bug #794 with r20359 to Ruby 1.9’s trunk. November 27th, 2008 to June 2nd, 2009. Every site running Ruby 1.8.x which creates BigDecimalTHESE ARE SLIDES.
These are slides. Which means they’re the visual accompaniment to an actual talk. They contain a fraction of the information I actually talked about, so scrolling through them can reallyCODAHALE.COM
Modern symmetric encryption is built around Authenticated Encryption with Associated Data (AEAD) constructions: combinations of ciphers and message authentication codes which provide strong guarantees of both confidentiality and integrity. CONTACT | CODAHALE.COM Coda Hale { writing, projects, about, contact} contact. You can email me at coda.hale@gmail.com. © 2009-2020 Coda Hale 2020 Coda HaleA SMALL, NICE THING
TOWARDS A SAFER FOOTGUN Towards A Safer Footgun. In which encryption's splash damage is somewhat nerfed. 08 Jun 2017. Modern symmetric encryption is built around Authenticated Encryption with Associated Data (AEAD) constructions: combinations of ciphers and message authentication codes which provide strong guarantees of both confidentiality andintegrity.
USL4J AND YOU
The Universal Scalability Law. The Universal Scalability Law, developed by Neil J. Gunther, is a model which combines Amdahl’s Law and Gustafson’s Law to produce a nonlinear model which can be used to predict a system’s behavior: X ( N) = λ N 1 + σ ( N − 1) + κN ( N − 1)
CODAHALE.COM
Redirecting to https://codahale.com/projects.html WHAT MAKES JERSEY INTERESTING: PARAMETER CLASSES Jersey is the reference implementation of JSR311, which is the Java community’s incredibly bureaucratic way of coming up with a decent API for writing RESTful web services. Despite the gray-flannel-suit feel to it, it’s actually a delight to work with. Broadly speaking, Jersey maps resources to classes, and HTTP verbs to methods. WHAT MAKES JERSEY INTERESTING: INJECTION PROVIDERS 16 May 2009. Ok, let’s get back to the geeky stuff. Another interesting thing about Jersey (in addition to parameter classes) is the way it uses dependency injection. Jersey doesn’t have an abstract base class for resources, like Rails’ ActionController::Base or Restlet’s Resource.This removes the obvious way of retrieving information about the incoming request: fromthe base class.
HOW NOT TO FIX A SECURITY BUG 14 Jun 2009 November 25th, 2008. Tadayoshi Funaba opens Bug #794 in the Ruby Issue Tracking System describing a segmentation fault when huge decimal strings are converted into BigDecimal instances. November 26th, 2008. Matz closes Bug #794 with r20359 to Ruby 1.9’s trunk. November 27th, 2008 to June 2nd, 2009. Every site running Ruby 1.8.x which creates BigDecimalTHESE ARE SLIDES.
These are slides. Which means they’re the visual accompaniment to an actual talk. They contain a fraction of the information I actually talked about, so scrolling through them can reallyCODAHALE.COM
Modern symmetric encryption is built around Authenticated Encryption with Associated Data (AEAD) constructions: combinations of ciphers and message authentication codes which provide strong guarantees of both confidentiality and integrity. CODA HALE WRITES THINGS. On The Difficulty Of Conjuring Up A Dryad 17 May 2017. The Happy Genius Of My Household 16 May 2017. On Containers 30 Aug 2016. Fan-In 01 Feb 2016. A Small, Nice Thing 30 Jan 2016. The Rest Of The Story 29 Nov 2011. You Can’t Sacrifice Partition Tolerance 07 Oct 2010. How To Safely Store A Password 31 Jan 2010. FOSS and Male Privilege 27 Aug PROJECTS | CODAHALE.COM The Programming Ape. Humans, you may have noticed, are not exactly rational. And yet here we are, trying to get them to build software. It’s a bit of a mess. But there is some good news: by drawing on modern theories of human cognition we can begin to optimize our tools for how people think, not how computers work. ABOUT | CODAHALE.COM about. I’m a programmer who lives in Fort Collins, CO. If you need to get ahold of me, shoot me an email at coda.hale@gmail.com . I’m not interested in job/investment opportunities or debating things, but I’m always interested in hearing from old friends. Here’s some of the things I’ve done.WORK IS WORK
Point-to-point communication (i.e., talking to each other) can be modeled as the activation of a subset of those dyads. While some organizations are chattier than others, this communication is essential for the sharing of information and the coordination ofaction. But
USL4J AND YOU
The Universal Scalability Law. The Universal Scalability Law, developed by Neil J. Gunther, is a model which combines Amdahl’s Law and Gustafson’s Law to produce a nonlinear model which can be used to predict a system’s behavior: X ( N) = λ N 1 + σ ( N − 1) + κN ( N − 1)
HOW TO SAFELY STORE A PASSWORD 31 Jan 2010 Use bcrypt. Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.. Why Not {MD5, SHA1, SHA2, SHA3, etc}? These are all general purpose hash functions, designed to calculate a digest of huge amounts of data in as short a time as possible. This means that they are fantastic for ensuring the integrity of data and utterly rubbish for FAN-IN | CODAHALE.COM Fan-In. In which attention is lensed. 01 Feb 2016. For a long time, my go-to question when interviewing a candidate was about building Twitter. I was looking to see how they thought about scalability and so, in classic programming interview cargo cult style, I would try to lead the candidate down the road of designing a system which could THE HAPPY GENIUS OF MY HOUSEHOLD The Happy Genius Of My Household. In which clouds are considered. This article was originally posted on blog.skyliner.io on Aug 29, 2016. When viewed from one angle, we’re in the middle of an infrastructure software renaissance: a cornucopia of distributed databases, self-healing meshes, and software-defined anythings, all radiatingwith
YOU CAN’T SACRIFICE PARTITION TOLERANCE You Can’t Sacrifice Partition Tolerance. In which there are limits to the CAP conjecture. 07 Oct 2010. I’ve seen a number of distributed databases recently describe themselves as being “CA” –that is, providing both consistency and availability while not providing partition-tolerance. To me, this indicates that thedevelopers of these
VIRTUAL MACHINES ARE FLEETING THINGS 18 May 2017. This article was originally posted on blog.skyliner.io on Feb 23, 2017. Last month, AWS sent us an email regretfully informingus that the
CODA HALE WRITES THINGS. On The Difficulty Of Conjuring Up A Dryad 17 May 2017. The Happy Genius Of My Household 16 May 2017. On Containers 30 Aug 2016. Fan-In 01 Feb 2016. A Small, Nice Thing 30 Jan 2016. The Rest Of The Story 29 Nov 2011. You Can’t Sacrifice Partition Tolerance 07 Oct 2010. How To Safely Store A Password 31 Jan 2010. FOSS and Male Privilege 27 Aug ABOUT | CODAHALE.COM about. I’m a programmer who lives in Fort Collins, CO. If you need to get ahold of me, shoot me an email at coda.hale@gmail.com . I’m not interested in job/investment opportunities or debating things, but I’m always interested in hearing from old friends. Here’s some of the things I’ve done. CONTACT | CODAHALE.COM Coda Hale { writing, projects, about, contact} contact. You can email me at coda.hale@gmail.com. © 2009-2020 Coda Hale 2020 Coda HaleA SMALL, NICE THING
WHAT MAKES JERSEY INTERESTING: PARAMETER CLASSES Jersey is the reference implementation of JSR311, which is the Java community’s incredibly bureaucratic way of coming up with a decent API for writing RESTful web services. Despite the gray-flannel-suit feel to it, it’s actually a delight to work with. Broadly speaking, Jersey maps resources to classes, and HTTP verbs to methods.CODAHALE.COM
Redirecting to https://codahale.com/projects.html WHAT MAKES JERSEY INTERESTING: INJECTION PROVIDERS 16 May 2009. Ok, let’s get back to the geeky stuff. Another interesting thing about Jersey (in addition to parameter classes) is the way it uses dependency injection. Jersey doesn’t have an abstract base class for resources, like Rails’ ActionController::Base or Restlet’s Resource.This removes the obvious way of retrieving information about the incoming request: fromthe base class.
HOW NOT TO FIX A SECURITY BUG 14 Jun 2009 November 25th, 2008. Tadayoshi Funaba opens Bug #794 in the Ruby Issue Tracking System describing a segmentation fault when huge decimal strings are converted into BigDecimal instances. November 26th, 2008. Matz closes Bug #794 with r20359 to Ruby 1.9’s trunk. November 27th, 2008 to June 2nd, 2009. Every site running Ruby 1.8.x which creates BigDecimalTHESE ARE SLIDES.
These are slides. Which means they’re the visual accompaniment to an actual talk. They contain a fraction of the information I actually talked about, so scrolling through them can reallyCODAHALE.COM
Modern symmetric encryption is built around Authenticated Encryption with Associated Data (AEAD) constructions: combinations of ciphers and message authentication codes which provide strong guarantees of both confidentiality and integrity. CODA HALE WRITES THINGS. On The Difficulty Of Conjuring Up A Dryad 17 May 2017. The Happy Genius Of My Household 16 May 2017. On Containers 30 Aug 2016. Fan-In 01 Feb 2016. A Small, Nice Thing 30 Jan 2016. The Rest Of The Story 29 Nov 2011. You Can’t Sacrifice Partition Tolerance 07 Oct 2010. How To Safely Store A Password 31 Jan 2010. FOSS and Male Privilege 27 Aug ABOUT | CODAHALE.COM about. I’m a programmer who lives in Fort Collins, CO. If you need to get ahold of me, shoot me an email at coda.hale@gmail.com . I’m not interested in job/investment opportunities or debating things, but I’m always interested in hearing from old friends. Here’s some of the things I’ve done. CONTACT | CODAHALE.COM Coda Hale { writing, projects, about, contact} contact. You can email me at coda.hale@gmail.com. © 2009-2020 Coda Hale 2020 Coda HaleA SMALL, NICE THING
WHAT MAKES JERSEY INTERESTING: PARAMETER CLASSES Jersey is the reference implementation of JSR311, which is the Java community’s incredibly bureaucratic way of coming up with a decent API for writing RESTful web services. Despite the gray-flannel-suit feel to it, it’s actually a delight to work with. Broadly speaking, Jersey maps resources to classes, and HTTP verbs to methods.CODAHALE.COM
Redirecting to https://codahale.com/projects.html WHAT MAKES JERSEY INTERESTING: INJECTION PROVIDERS 16 May 2009. Ok, let’s get back to the geeky stuff. Another interesting thing about Jersey (in addition to parameter classes) is the way it uses dependency injection. Jersey doesn’t have an abstract base class for resources, like Rails’ ActionController::Base or Restlet’s Resource.This removes the obvious way of retrieving information about the incoming request: fromthe base class.
HOW NOT TO FIX A SECURITY BUG 14 Jun 2009 November 25th, 2008. Tadayoshi Funaba opens Bug #794 in the Ruby Issue Tracking System describing a segmentation fault when huge decimal strings are converted into BigDecimal instances. November 26th, 2008. Matz closes Bug #794 with r20359 to Ruby 1.9’s trunk. November 27th, 2008 to June 2nd, 2009. Every site running Ruby 1.8.x which creates BigDecimalTHESE ARE SLIDES.
These are slides. Which means they’re the visual accompaniment to an actual talk. They contain a fraction of the information I actually talked about, so scrolling through them can reallyCODAHALE.COM
Modern symmetric encryption is built around Authenticated Encryption with Associated Data (AEAD) constructions: combinations of ciphers and message authentication codes which provide strong guarantees of both confidentiality and integrity. CODA HALE WRITES THINGS. On The Difficulty Of Conjuring Up A Dryad 17 May 2017. The Happy Genius Of My Household 16 May 2017. On Containers 30 Aug 2016. Fan-In 01 Feb 2016. A Small, Nice Thing 30 Jan 2016. The Rest Of The Story 29 Nov 2011. You Can’t Sacrifice Partition Tolerance 07 Oct 2010. How To Safely Store A Password 31 Jan 2010. FOSS and Male Privilege 27 Aug ABOUT | CODAHALE.COM about. I’m a programmer who lives in Fort Collins, CO. If you need to get ahold of me, shoot me an email at coda.hale@gmail.com . I’m not interested in job/investment opportunities or debating things, but I’m always interested in hearing from old friends. Here’s some of the things I’ve done. PROJECTS | CODAHALE.COM The Programming Ape. Humans, you may have noticed, are not exactly rational. And yet here we are, trying to get them to build software. It’s a bit of a mess. But there is some good news: by drawing on modern theories of human cognition we can begin to optimize our tools for how people think, not how computers work.WORK IS WORK
Point-to-point communication (i.e., talking to each other) can be modeled as the activation of a subset of those dyads. While some organizations are chattier than others, this communication is essential for the sharing of information and the coordination ofaction. But
WHAT MAKES JERSEY INTERESTING: INJECTION PROVIDERS 16 May 2009. Ok, let’s get back to the geeky stuff. Another interesting thing about Jersey (in addition to parameter classes) is the way it uses dependency injection. Jersey doesn’t have an abstract base class for resources, like Rails’ ActionController::Base or Restlet’s Resource.This removes the obvious way of retrieving information about the incoming request: fromthe base class.
THE HAPPY GENIUS OF MY HOUSEHOLD The Happy Genius Of My Household. In which clouds are considered. This article was originally posted on blog.skyliner.io on Aug 29, 2016. When viewed from one angle, we’re in the middle of an infrastructure software renaissance: a cornucopia of distributed databases, self-healing meshes, and software-defined anythings, all radiatingwith
HOW TO SAFELY STORE A PASSWORD 31 Jan 2010 Use bcrypt. Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.. Why Not {MD5, SHA1, SHA2, SHA3, etc}? These are all general purpose hash functions, designed to calculate a digest of huge amounts of data in as short a time as possible. This means that they are fantastic for ensuring the integrity of data and utterly rubbish forUSL4J AND YOU
The Universal Scalability Law. The Universal Scalability Law, developed by Neil J. Gunther, is a model which combines Amdahl’s Law and Gustafson’s Law to produce a nonlinear model which can be used to predict a system’s behavior: X ( N) = λ N 1 + σ ( N − 1) + κN ( N − 1)
FAN-IN | CODAHALE.COM Fan-In. In which attention is lensed. 01 Feb 2016. For a long time, my go-to question when interviewing a candidate was about building Twitter. I was looking to see how they thought about scalability and so, in classic programming interview cargo cult style, I would try to lead the candidate down the road of designing a system which could VIRTUAL MACHINES ARE FLEETING THINGS 18 May 2017. This article was originally posted on blog.skyliner.io on Feb 23, 2017. Last month, AWS sent us an email regretfully informingus that the
CODA HALE WRITES THINGS. On The Difficulty Of Conjuring Up A Dryad 17 May 2017. The Happy Genius Of My Household 16 May 2017. On Containers 30 Aug 2016. Fan-In 01 Feb 2016. A Small, Nice Thing 30 Jan 2016. The Rest Of The Story 29 Nov 2011. You Can’t Sacrifice Partition Tolerance 07 Oct 2010. How To Safely Store A Password 31 Jan 2010. FOSS and Male Privilege 27 Aug ABOUT | CODAHALE.COM about. I’m a programmer who lives in Fort Collins, CO. If you need to get ahold of me, shoot me an email at coda.hale@gmail.com . I’m not interested in job/investment opportunities or debating things, but I’m always interested in hearing from old friends. Here’s some of the things I’ve done. CONTACT | CODAHALE.COM Coda Hale { writing, projects, about, contact} contact. You can email me at coda.hale@gmail.com. © 2009-2020 Coda Hale 2020 Coda HaleA SMALL, NICE THING
WHAT MAKES JERSEY INTERESTING: PARAMETER CLASSES Jersey is the reference implementation of JSR311, which is the Java community’s incredibly bureaucratic way of coming up with a decent API for writing RESTful web services. Despite the gray-flannel-suit feel to it, it’s actually a delight to work with. Broadly speaking, Jersey maps resources to classes, and HTTP verbs to methods.CODAHALE.COM
Redirecting to https://codahale.com/projects.html WHAT MAKES JERSEY INTERESTING: INJECTION PROVIDERS 16 May 2009. Ok, let’s get back to the geeky stuff. Another interesting thing about Jersey (in addition to parameter classes) is the way it uses dependency injection. Jersey doesn’t have an abstract base class for resources, like Rails’ ActionController::Base or Restlet’s Resource.This removes the obvious way of retrieving information about the incoming request: fromthe base class.
HOW NOT TO FIX A SECURITY BUG 14 Jun 2009 November 25th, 2008. Tadayoshi Funaba opens Bug #794 in the Ruby Issue Tracking System describing a segmentation fault when huge decimal strings are converted into BigDecimal instances. November 26th, 2008. Matz closes Bug #794 with r20359 to Ruby 1.9’s trunk. November 27th, 2008 to June 2nd, 2009. Every site running Ruby 1.8.x which creates BigDecimalTHESE ARE SLIDES.
These are slides. Which means they’re the visual accompaniment to an actual talk. They contain a fraction of the information I actually talked about, so scrolling through them can reallyCODAHALE.COM
Modern symmetric encryption is built around Authenticated Encryption with Associated Data (AEAD) constructions: combinations of ciphers and message authentication codes which provide strong guarantees of both confidentiality and integrity. CODA HALE WRITES THINGS. On The Difficulty Of Conjuring Up A Dryad 17 May 2017. The Happy Genius Of My Household 16 May 2017. On Containers 30 Aug 2016. Fan-In 01 Feb 2016. A Small, Nice Thing 30 Jan 2016. The Rest Of The Story 29 Nov 2011. You Can’t Sacrifice Partition Tolerance 07 Oct 2010. How To Safely Store A Password 31 Jan 2010. FOSS and Male Privilege 27 Aug ABOUT | CODAHALE.COM about. I’m a programmer who lives in Fort Collins, CO. If you need to get ahold of me, shoot me an email at coda.hale@gmail.com . I’m not interested in job/investment opportunities or debating things, but I’m always interested in hearing from old friends. Here’s some of the things I’ve done. CONTACT | CODAHALE.COM Coda Hale { writing, projects, about, contact} contact. You can email me at coda.hale@gmail.com. © 2009-2020 Coda Hale 2020 Coda HaleA SMALL, NICE THING
WHAT MAKES JERSEY INTERESTING: PARAMETER CLASSES Jersey is the reference implementation of JSR311, which is the Java community’s incredibly bureaucratic way of coming up with a decent API for writing RESTful web services. Despite the gray-flannel-suit feel to it, it’s actually a delight to work with. Broadly speaking, Jersey maps resources to classes, and HTTP verbs to methods.CODAHALE.COM
Redirecting to https://codahale.com/projects.html WHAT MAKES JERSEY INTERESTING: INJECTION PROVIDERS 16 May 2009. Ok, let’s get back to the geeky stuff. Another interesting thing about Jersey (in addition to parameter classes) is the way it uses dependency injection. Jersey doesn’t have an abstract base class for resources, like Rails’ ActionController::Base or Restlet’s Resource.This removes the obvious way of retrieving information about the incoming request: fromthe base class.
HOW NOT TO FIX A SECURITY BUG 14 Jun 2009 November 25th, 2008. Tadayoshi Funaba opens Bug #794 in the Ruby Issue Tracking System describing a segmentation fault when huge decimal strings are converted into BigDecimal instances. November 26th, 2008. Matz closes Bug #794 with r20359 to Ruby 1.9’s trunk. November 27th, 2008 to June 2nd, 2009. Every site running Ruby 1.8.x which creates BigDecimalTHESE ARE SLIDES.
These are slides. Which means they’re the visual accompaniment to an actual talk. They contain a fraction of the information I actually talked about, so scrolling through them can reallyCODAHALE.COM
Modern symmetric encryption is built around Authenticated Encryption with Associated Data (AEAD) constructions: combinations of ciphers and message authentication codes which provide strong guarantees of both confidentiality and integrity. CODA HALE WRITES THINGS. On The Difficulty Of Conjuring Up A Dryad 17 May 2017. The Happy Genius Of My Household 16 May 2017. On Containers 30 Aug 2016. Fan-In 01 Feb 2016. A Small, Nice Thing 30 Jan 2016. The Rest Of The Story 29 Nov 2011. You Can’t Sacrifice Partition Tolerance 07 Oct 2010. How To Safely Store A Password 31 Jan 2010. FOSS and Male Privilege 27 Aug ABOUT | CODAHALE.COM about. I’m a programmer who lives in Fort Collins, CO. If you need to get ahold of me, shoot me an email at coda.hale@gmail.com . I’m not interested in job/investment opportunities or debating things, but I’m always interested in hearing from old friends. Here’s some of the things I’ve done. PROJECTS | CODAHALE.COM The Programming Ape. Humans, you may have noticed, are not exactly rational. And yet here we are, trying to get them to build software. It’s a bit of a mess. But there is some good news: by drawing on modern theories of human cognition we can begin to optimize our tools for how people think, not how computers work.WORK IS WORK
Point-to-point communication (i.e., talking to each other) can be modeled as the activation of a subset of those dyads. While some organizations are chattier than others, this communication is essential for the sharing of information and the coordination ofaction. But
WHAT MAKES JERSEY INTERESTING: INJECTION PROVIDERS 16 May 2009. Ok, let’s get back to the geeky stuff. Another interesting thing about Jersey (in addition to parameter classes) is the way it uses dependency injection. Jersey doesn’t have an abstract base class for resources, like Rails’ ActionController::Base or Restlet’s Resource.This removes the obvious way of retrieving information about the incoming request: fromthe base class.
THE HAPPY GENIUS OF MY HOUSEHOLD The Happy Genius Of My Household. In which clouds are considered. This article was originally posted on blog.skyliner.io on Aug 29, 2016. When viewed from one angle, we’re in the middle of an infrastructure software renaissance: a cornucopia of distributed databases, self-healing meshes, and software-defined anythings, all radiatingwith
HOW TO SAFELY STORE A PASSWORD 31 Jan 2010 Use bcrypt. Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.. Why Not {MD5, SHA1, SHA2, SHA3, etc}? These are all general purpose hash functions, designed to calculate a digest of huge amounts of data in as short a time as possible. This means that they are fantastic for ensuring the integrity of data and utterly rubbish forUSL4J AND YOU
The Universal Scalability Law. The Universal Scalability Law, developed by Neil J. Gunther, is a model which combines Amdahl’s Law and Gustafson’s Law to produce a nonlinear model which can be used to predict a system’s behavior: X ( N) = λ N 1 + σ ( N − 1) + κN ( N − 1)
FAN-IN | CODAHALE.COM Fan-In. In which attention is lensed. 01 Feb 2016. For a long time, my go-to question when interviewing a candidate was about building Twitter. I was looking to see how they thought about scalability and so, in classic programming interview cargo cult style, I would try to lead the candidate down the road of designing a system which could VIRTUAL MACHINES ARE FLEETING THINGS 18 May 2017. This article was originally posted on blog.skyliner.io on Feb 23, 2017. Last month, AWS sent us an email regretfully informingus that the
CODA HALE WRITES THINGS. On The Difficulty Of Conjuring Up A Dryad 17 May 2017. The Happy Genius Of My Household 16 May 2017. On Containers 30 Aug 2016. Fan-In 01 Feb 2016. A Small, Nice Thing 30 Jan 2016. The Rest Of The Story 29 Nov 2011. You Can’t Sacrifice Partition Tolerance 07 Oct 2010. How To Safely Store A Password 31 Jan 2010. FOSS and Male Privilege 27 Aug ABOUT | CODAHALE.COM about. I’m a programmer who lives in Fort Collins, CO. If you need to get ahold of me, shoot me an email at coda.hale@gmail.com . I’m not interested in job/investment opportunities or debating things, but I’m always interested in hearing from old friends. Here’s some of the things I’ve done. CONTACT | CODAHALE.COM Coda Hale { writing, projects, about, contact} contact. You can email me at coda.hale@gmail.com. © 2009-2020 Coda Hale 2020 Coda HaleA SMALL, NICE THING
WHAT MAKES JERSEY INTERESTING: PARAMETER CLASSES Jersey is the reference implementation of JSR311, which is the Java community’s incredibly bureaucratic way of coming up with a decent API for writing RESTful web services. Despite the gray-flannel-suit feel to it, it’s actually a delight to work with. Broadly speaking, Jersey maps resources to classes, and HTTP verbs to methods.CODAHALE.COM
Redirecting to https://codahale.com/projects.html WHAT MAKES JERSEY INTERESTING: INJECTION PROVIDERS 16 May 2009. Ok, let’s get back to the geeky stuff. Another interesting thing about Jersey (in addition to parameter classes) is the way it uses dependency injection. Jersey doesn’t have an abstract base class for resources, like Rails’ ActionController::Base or Restlet’s Resource.This removes the obvious way of retrieving information about the incoming request: fromthe base class.
HOW NOT TO FIX A SECURITY BUG 14 Jun 2009 November 25th, 2008. Tadayoshi Funaba opens Bug #794 in the Ruby Issue Tracking System describing a segmentation fault when huge decimal strings are converted into BigDecimal instances. November 26th, 2008. Matz closes Bug #794 with r20359 to Ruby 1.9’s trunk. November 27th, 2008 to June 2nd, 2009. Every site running Ruby 1.8.x which creates BigDecimalTHESE ARE SLIDES.
These are slides. Which means they’re the visual accompaniment to an actual talk. They contain a fraction of the information I actually talked about, so scrolling through them can reallyCODAHALE.COM
Modern symmetric encryption is built around Authenticated Encryption with Associated Data (AEAD) constructions: combinations of ciphers and message authentication codes which provide strong guarantees of both confidentiality and integrity. CODA HALE WRITES THINGS. On The Difficulty Of Conjuring Up A Dryad 17 May 2017. The Happy Genius Of My Household 16 May 2017. On Containers 30 Aug 2016. Fan-In 01 Feb 2016. A Small, Nice Thing 30 Jan 2016. The Rest Of The Story 29 Nov 2011. You Can’t Sacrifice Partition Tolerance 07 Oct 2010. How To Safely Store A Password 31 Jan 2010. FOSS and Male Privilege 27 Aug ABOUT | CODAHALE.COM about. I’m a programmer who lives in Fort Collins, CO. If you need to get ahold of me, shoot me an email at coda.hale@gmail.com . I’m not interested in job/investment opportunities or debating things, but I’m always interested in hearing from old friends. Here’s some of the things I’ve done. CONTACT | CODAHALE.COM Coda Hale { writing, projects, about, contact} contact. You can email me at coda.hale@gmail.com. © 2009-2020 Coda Hale 2020 Coda HaleA SMALL, NICE THING
WHAT MAKES JERSEY INTERESTING: PARAMETER CLASSES Jersey is the reference implementation of JSR311, which is the Java community’s incredibly bureaucratic way of coming up with a decent API for writing RESTful web services. Despite the gray-flannel-suit feel to it, it’s actually a delight to work with. Broadly speaking, Jersey maps resources to classes, and HTTP verbs to methods.CODAHALE.COM
Redirecting to https://codahale.com/projects.html WHAT MAKES JERSEY INTERESTING: INJECTION PROVIDERS 16 May 2009. Ok, let’s get back to the geeky stuff. Another interesting thing about Jersey (in addition to parameter classes) is the way it uses dependency injection. Jersey doesn’t have an abstract base class for resources, like Rails’ ActionController::Base or Restlet’s Resource.This removes the obvious way of retrieving information about the incoming request: fromthe base class.
HOW NOT TO FIX A SECURITY BUG 14 Jun 2009 November 25th, 2008. Tadayoshi Funaba opens Bug #794 in the Ruby Issue Tracking System describing a segmentation fault when huge decimal strings are converted into BigDecimal instances. November 26th, 2008. Matz closes Bug #794 with r20359 to Ruby 1.9’s trunk. November 27th, 2008 to June 2nd, 2009. Every site running Ruby 1.8.x which creates BigDecimalTHESE ARE SLIDES.
These are slides. Which means they’re the visual accompaniment to an actual talk. They contain a fraction of the information I actually talked about, so scrolling through them can reallyCODAHALE.COM
Modern symmetric encryption is built around Authenticated Encryption with Associated Data (AEAD) constructions: combinations of ciphers and message authentication codes which provide strong guarantees of both confidentiality and integrity. CODA HALE WRITES THINGS. On The Difficulty Of Conjuring Up A Dryad 17 May 2017. The Happy Genius Of My Household 16 May 2017. On Containers 30 Aug 2016. Fan-In 01 Feb 2016. A Small, Nice Thing 30 Jan 2016. The Rest Of The Story 29 Nov 2011. You Can’t Sacrifice Partition Tolerance 07 Oct 2010. How To Safely Store A Password 31 Jan 2010. FOSS and Male Privilege 27 Aug ABOUT | CODAHALE.COM about. I’m a programmer who lives in Fort Collins, CO. If you need to get ahold of me, shoot me an email at coda.hale@gmail.com . I’m not interested in job/investment opportunities or debating things, but I’m always interested in hearing from old friends. Here’s some of the things I’ve done. PROJECTS | CODAHALE.COM The Programming Ape. Humans, you may have noticed, are not exactly rational. And yet here we are, trying to get them to build software. It’s a bit of a mess. But there is some good news: by drawing on modern theories of human cognition we can begin to optimize our tools for how people think, not how computers work.WORK IS WORK
Point-to-point communication (i.e., talking to each other) can be modeled as the activation of a subset of those dyads. While some organizations are chattier than others, this communication is essential for the sharing of information and the coordination ofaction. But
WHAT MAKES JERSEY INTERESTING: INJECTION PROVIDERS 16 May 2009. Ok, let’s get back to the geeky stuff. Another interesting thing about Jersey (in addition to parameter classes) is the way it uses dependency injection. Jersey doesn’t have an abstract base class for resources, like Rails’ ActionController::Base or Restlet’s Resource.This removes the obvious way of retrieving information about the incoming request: fromthe base class.
THE HAPPY GENIUS OF MY HOUSEHOLD The Happy Genius Of My Household. In which clouds are considered. This article was originally posted on blog.skyliner.io on Aug 29, 2016. When viewed from one angle, we’re in the middle of an infrastructure software renaissance: a cornucopia of distributed databases, self-healing meshes, and software-defined anythings, all radiatingwith
HOW TO SAFELY STORE A PASSWORD 31 Jan 2010 Use bcrypt. Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.. Why Not {MD5, SHA1, SHA2, SHA3, etc}? These are all general purpose hash functions, designed to calculate a digest of huge amounts of data in as short a time as possible. This means that they are fantastic for ensuring the integrity of data and utterly rubbish forUSL4J AND YOU
The Universal Scalability Law. The Universal Scalability Law, developed by Neil J. Gunther, is a model which combines Amdahl’s Law and Gustafson’s Law to produce a nonlinear model which can be used to predict a system’s behavior: X ( N) = λ N 1 + σ ( N − 1) + κN ( N − 1)
FAN-IN | CODAHALE.COM Fan-In. In which attention is lensed. 01 Feb 2016. For a long time, my go-to question when interviewing a candidate was about building Twitter. I was looking to see how they thought about scalability and so, in classic programming interview cargo cult style, I would try to lead the candidate down the road of designing a system which could VIRTUAL MACHINES ARE FLEETING THINGS 18 May 2017. This article was originally posted on blog.skyliner.io on Feb 23, 2017. Last month, AWS sent us an email regretfully informingus that the
CONTACT | CODAHALE.COM Coda Hale { writing, projects, about, contact} contact. You can email me at coda.hale@gmail.com. © 2009-2020 Coda Hale 2020 Coda HaleA SMALL, NICE THING
USL4J AND YOU
The Universal Scalability Law. The Universal Scalability Law, developed by Neil J. Gunther, is a model which combines Amdahl’s Law and Gustafson’s Law to produce a nonlinear model which can be used to predict a system’s behavior: X ( N) = λ N 1 + σ ( N − 1) + κN ( N − 1)
WHAT MAKES JERSEY INTERESTING: PARAMETER CLASSES Jersey is the reference implementation of JSR311, which is the Java community’s incredibly bureaucratic way of coming up with a decent API for writing RESTful web services. Despite the gray-flannel-suit feel to it, it’s actually a delight to work with. Broadly speaking, Jersey maps resources to classes, and HTTP verbs to methods.CODAHALE.COM
Redirecting to https://codahale.com/projects.html WHAT MAKES JERSEY INTERESTING: INJECTION PROVIDERS 16 May 2009. Ok, let’s get back to the geeky stuff. Another interesting thing about Jersey (in addition to parameter classes) is the way it uses dependency injection. Jersey doesn’t have an abstract base class for resources, like Rails’ ActionController::Base or Restlet’s Resource.This removes the obvious way of retrieving information about the incoming request: fromthe base class.
YOU CAN’T SACRIFICE PARTITION TOLERANCE You Can’t Sacrifice Partition Tolerance. In which there are limits to the CAP conjecture. 07 Oct 2010. I’ve seen a number of distributed databases recently describe themselves as being “CA” –that is, providing both consistency and availability while not providing partition-tolerance. To me, this indicates that thedevelopers of these
HOW NOT TO FIX A SECURITY BUG 14 Jun 2009 November 25th, 2008. Tadayoshi Funaba opens Bug #794 in the Ruby Issue Tracking System describing a segmentation fault when huge decimal strings are converted into BigDecimal instances. November 26th, 2008. Matz closes Bug #794 with r20359 to Ruby 1.9’s trunk. November 27th, 2008 to June 2nd, 2009. Every site running Ruby 1.8.x which creates BigDecimalTHESE ARE SLIDES.
These are slides. Which means they’re the visual accompaniment to an actual talk. They contain a fraction of the information I actually talked about, so scrolling through them can reallyCODAHALE.COM
Modern symmetric encryption is built around Authenticated Encryption with Associated Data (AEAD) constructions: combinations of ciphers and message authentication codes which provide strong guarantees of both confidentiality and integrity. CONTACT | CODAHALE.COM Coda Hale { writing, projects, about, contact} contact. You can email me at coda.hale@gmail.com. © 2009-2020 Coda Hale 2020 Coda HaleA SMALL, NICE THING
USL4J AND YOU
The Universal Scalability Law. The Universal Scalability Law, developed by Neil J. Gunther, is a model which combines Amdahl’s Law and Gustafson’s Law to produce a nonlinear model which can be used to predict a system’s behavior: X ( N) = λ N 1 + σ ( N − 1) + κN ( N − 1)
WHAT MAKES JERSEY INTERESTING: PARAMETER CLASSES Jersey is the reference implementation of JSR311, which is the Java community’s incredibly bureaucratic way of coming up with a decent API for writing RESTful web services. Despite the gray-flannel-suit feel to it, it’s actually a delight to work with. Broadly speaking, Jersey maps resources to classes, and HTTP verbs to methods.CODAHALE.COM
Redirecting to https://codahale.com/projects.html WHAT MAKES JERSEY INTERESTING: INJECTION PROVIDERS 16 May 2009. Ok, let’s get back to the geeky stuff. Another interesting thing about Jersey (in addition to parameter classes) is the way it uses dependency injection. Jersey doesn’t have an abstract base class for resources, like Rails’ ActionController::Base or Restlet’s Resource.This removes the obvious way of retrieving information about the incoming request: fromthe base class.
YOU CAN’T SACRIFICE PARTITION TOLERANCE You Can’t Sacrifice Partition Tolerance. In which there are limits to the CAP conjecture. 07 Oct 2010. I’ve seen a number of distributed databases recently describe themselves as being “CA” –that is, providing both consistency and availability while not providing partition-tolerance. To me, this indicates that thedevelopers of these
HOW NOT TO FIX A SECURITY BUG 14 Jun 2009 November 25th, 2008. Tadayoshi Funaba opens Bug #794 in the Ruby Issue Tracking System describing a segmentation fault when huge decimal strings are converted into BigDecimal instances. November 26th, 2008. Matz closes Bug #794 with r20359 to Ruby 1.9’s trunk. November 27th, 2008 to June 2nd, 2009. Every site running Ruby 1.8.x which creates BigDecimalTHESE ARE SLIDES.
These are slides. Which means they’re the visual accompaniment to an actual talk. They contain a fraction of the information I actually talked about, so scrolling through them can reallyCODAHALE.COM
Modern symmetric encryption is built around Authenticated Encryption with Associated Data (AEAD) constructions: combinations of ciphers and message authentication codes which provide strong guarantees of both confidentiality and integrity. CODA HALE WRITES THINGS. On The Difficulty Of Conjuring Up A Dryad 17 May 2017. The Happy Genius Of My Household 16 May 2017. On Containers 30 Aug 2016. Fan-In 01 Feb 2016. A Small, Nice Thing 30 Jan 2016. The Rest Of The Story 29 Nov 2011. You Can’t Sacrifice Partition Tolerance 07 Oct 2010. How To Safely Store A Password 31 Jan 2010. FOSS and Male Privilege 27 Aug ABOUT | CODAHALE.COM Wesabe (2006-2009) I was the second full-time hire at Wesabe. I worked on the main Rails codebase, shipped some awesome features (badges! forums!), learned a lot about programming, business, money, time zones, character sets, and more. Re-wrote a bunch of the analytics driving account visualization in Java. Wrote a GPG-based documentstorage
PROJECTS | CODAHALE.COM The Programming Ape. Humans, you may have noticed, are not exactly rational. And yet here we are, trying to get them to build software. It’s a bit of a mess. But there is some good news: by drawing on modern theories of human cognition we can begin to optimize our tools for how people think, not how computers work.WORK IS WORK
Point-to-point communication (i.e., talking to each other) can be modeled as the activation of a subset of those dyads. While some organizations are chattier than others, this communication is essential for the sharing of information and the coordination ofaction. But
ON CONTAINERS
On Containers. In which I write a blog post somewhere else. 30 Aug 2016. As you may or may not know, I founded a company ( Skyliner) with some friends at the beginning of the year, focused on making it easier to set up and operate web applications on AWS. I just wrote an article about our approach to containers and the economics underlying that HOW TO SAFELY STORE A PASSWORD 31 Jan 2010 Use bcrypt. Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.Use bcrypt.. Why Not {MD5, SHA1, SHA2, SHA3, etc}? These are all general purpose hash functions, designed to calculate a digest of huge amounts of data in as short a time as possible. This means that they are fantastic for ensuring the integrity of data and utterly rubbish for THE HAPPY GENIUS OF MY HOUSEHOLD The Happy Genius Of My Household. In which clouds are considered. This article was originally posted on blog.skyliner.io on Aug 29, 2016. When viewed from one angle, we’re in the middle of an infrastructure software renaissance: a cornucopia of distributed databases, self-healing meshes, and software-defined anythings, all radiatingwith
FAN-IN | CODAHALE.COM Fan-In. In which attention is lensed. 01 Feb 2016. For a long time, my go-to question when interviewing a candidate was about building Twitter. I was looking to see how they thought about scalability and so, in classic programming interview cargo cult style, I would try to lead the candidate down the road of designing a system which could YOU CAN’T SACRIFICE PARTITION TOLERANCE You Can’t Sacrifice Partition Tolerance. In which there are limits to the CAP conjecture. 07 Oct 2010. I’ve seen a number of distributed databases recently describe themselves as being “CA” –that is, providing both consistency and availability while not providing partition-tolerance. To me, this indicates that thedevelopers of these
VIRTUAL MACHINES ARE FLEETING THINGS 18 May 2017. This article was originally posted on blog.skyliner.io on Feb 23, 2017. Last month, AWS sent us an email regretfully informingus that the
CODA HALE { WRITING , PROJECTS , ABOUT ,CONTACT }
WRITING
* Work Is Work 12 Jan 2020 * Towards A Safer Footgun 08 Jun 2017 * usl4j And You 31 May 2017 * Risky Business Requires Active Operators 19 May 2017 * Virtual Machines Are Fleeting Things 18 May 2017 * On The Difficulty Of Conjuring Up A Dryad 17 May 2017 * The Happy Genius Of My Household 16 May 2017 * On Containers 30 Aug 2016 * Fan-In 01 Feb 2016 * A Small, Nice Thing 30 Jan 2016 * The Rest Of The Story 29 Nov 2011 * You Can’t Sacrifice Partition Tolerance 07 Oct 2010 * How To Safely Store A Password 31 Jan 2010 * FOSS and Male Privilege 27 Aug 2009 * A Lesson In Timing Attacks (or, Don’t use MessageDigest.isEquals) 13 Aug 2009 * How Not To Fix A Security Bug 14 Jun 2009 * What Makes Jersey Interesting: Injection Providers 16 May 2009 * Ruby and Male Privilege 10 May 2009 * When Formality Works 07 May 2009 * What Makes Jersey Interesting: Parameter Classes 02 May 2009 2009-2021 Coda HaleDetails
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0