Berliner Links

This is getting to be a thing, missing alternate weeks. Last weekend was the latest 383 Weekender, this time taking over Berlin. We saw the sights. Drank and ate. And hopefully didn’t lose a client because of room service. Enjoy the links.

Director GCHQ’s Christmas Puzzle – I’m currently working my way through the second round.

3 ways FullStory’s Rage Clicks help improve frustrating UX – Track ‘em all and let data sort it out.

Aircraft customer experience on a new level – Having worked with a few corporates now, I’m amazed they got this to production.

Cloudcraft AWS diagrams – Because nothing says architecture like a nice diagram.

256 LED Matrix – A fun little DIY project to try.

Design machines – Design is hard and more tools aren’t the answer.

The State of UX in 2016 – A good round up but then again, I just try and put buttons on a page.

Leaving the Mac App Store – You can’t put something up but shun the people you expect to populate it.

Echo of the Bunnymen – The gigahertz race is over but the mobile race could unseat Intel.

Moving the Washington Post to HTTPS – I keep on meaning to add SSL support to Hybrid Logic. Maybe one to do over Christmas.

If Reindeer Wrote JavaScript – And speaking of Christmas, a bit of geeky cheer.

3 Second Sandwich – A lot happens when you buy those shoes.

GitHub’s Metal Cloud – Tracking boxes for fun and profit.

Choosing an HTTP Status Code – Because nothing says error like a 200.

Do not underestimate credentials leaks – If you’ve published a key, you can’t hide it or remove it. You have to purge it completely from everywhere it was used.

How to be an automobile software engineer – I still remember CANBUS PCMCIA cards and the hell that was a timing pulse.

Building for HTTP/2 – A lot of the principles we take for granted now are going to change and it’s going to be fun watching it happen.

Linux Performance Analysis in 60,000 Milliseconds
A useful crib sheet for when you SSH into that flaky box and try and figure out what’s going on.

Anti-Disassembly techniques used by malware – And finally a bit of geekery for how the other half make like hard.

No Responses... Yet

It seems no one has left a comment yet, why not be the first?

Comments are closed.