• Type:

Best Stories

Best Stories from hackernews

A charity that spends a sliver of its money on those it purports to serve

The Center for Public Integrity is a nonprofit newsroom that investigates betrayals of public trust. Sign up to receive our stories. SARASOTA, Florida — A uniformed police officer rests his hand on a casket and bows his head in an image on the homepage of the Law Enforcement Officers Relief Fund. Next to the picture there’s…

You can’t just rename your IT Ops team and call it DevOps

I was really happy to give this interview to Jeff Meyerson on Software Engineering Daily, talking about DevOps, GitOps, software quality and how Datree can help.The bottom line for developers is that we need to ship software and we need it to be as reliable and as fast as possible. One way we can do…

How Microbiomes Affect Fear

Researchers are finding evidence that microbiomes can influence the fear responses of their hosts, possibly by releasing compounds that affect the brain’s neuroanatomy and function.Our brains may seem physically far removed from our guts, but in recent years, research has strongly suggested that the vast communities of microbes concentrated in our digestive tract open lines…

Bill Gates in Byte Magazine: The Future of Software Design (1983)

Internet Archive BookReader Byte Magazine Volume 08 Number 08 – The C Language

Where do individual contributors go once they peak?

The answer is often: to an entirely different role.This is an unfortunate reality playing out in product companies today, where after a few years those in IC—or “individual contributor”—roles find themselves seemingly stuck.Stuck in their ability to garner additional responsibility and impact within the organizations they are part of. Stuck in their place on the…

Samsung TVs May Upload Screenshots for Automatic Content Recognition

Samsung Privacy Policy for the U.S. Effective: April 30, 2019 Samsung Electronics Co., Ltd., along with our affiliates and subsidiaries, (collectively, “Samsung”) knows how important privacy is to our customers. This Privacy Policy describes the personal information we may obtain online across all of our Internet-connected Samsung devices and services (from mobile phones and tablets…

Uniqlo robots pick up packaged T-shirts and put them in a box

Choose your subscription Not sure which package to choose?Try full access for 4 weeks For 4 weeks receive unlimited Premium digital access to the FT’s trusted, award-winning business news Read more Be informed with the essentialnews and opinion MyFT – track the topics most important to you FT Weekend – full access to the weekend…

Networking Guides for Linux Sysadmins

This was a great year for sysadmins interested in broadening their skills and making friends with their networking colleagues. As we closed out the last few months of the year, our talented writers shared their expertise throughout the layers of the TCP/IP stack. Network novices had the opportunity to learn basic troubleshooting tools, configure VLANs,…

Build Your Own WebAssembly Compiler

Transcript Eberhardt: My name’s Colin Eberhardt. I’m the technology director of a company called Scott Logic, which I doubt any of you have heard about. We’re a fairly small UK-based software consultancy that specializes in writing some large-scale applications for financial services. I spend a lot of time writing fairly large-scale JavaScript applications. I’m also…

Behind the One-Way Mirror: A Dive into the Technology of Corporate Surveillance

By Bennett Cyphers and Gennie Gebhart Introduction Trackers are hiding in nearly every corner of today’s Internet, which is to say nearly every corner of modern life. The average web page shares data with dozens of third-parties. The average mobile app does the same, and many apps collect highly sensitive information like location and call…

Scroll to top