• submit to reddit
Tom Howlett06/12/13
0 replies

The Blamer

I blame others and they blame me. The more difficult the problem, the more I need the help of others, the more I blame others and push them away.

Johanna Rothman06/12/13
0 replies

Estimating the Unknown: Projects or Budgets, Part 2

So now that you know why it’s so difficult to estimate what do you do when someone asks you for an estimate?

Wille Faler06/11/13
1 replies

Software is the Central Nervous System of Modern Business

Software is the Central Nervous System of modern business, this is something that Bill Gates asserted way back in 1999 in his book “Business @ the Speed of Thought”, and it is even more true in 2013 than it was in 1999.

Jurgen Appelo06/11/13
0 replies

5 Reasons for Writing a Blog - Reason 1

The original purpose of my blog was to pave the way for my first book. But 5 years later I have realized that NOOP.NL has become more than just a vehicle for my book projects.

Allen Coin06/11/13
0 replies

Links You Don't Want to Miss (June 11)

Today: JDK 8 is almost feature-complete, Is Wikipedia's front page for sale?; how to encrypt your GChat from the NSA, the new Mac Pro and iOS from Apple, and why is embedding HTML5 still so difficult?

Justin Bozonier06/11/13
0 replies

Algorithm of the Week: Genetic Algorithms, Pt. 2 - Making It Run

Because we can find the value of the definite integral at any points we want, we can use another technique to turn that data into a formula. The technique we’ll be using is known as a genetic algorithm.

John Cook06/11/13
0 replies

The Weight of Code

Bjorn is discussing the ferrite core memory of the Apollo guidance system: "These are very, very robust memory systems. … But the problem is that they actually have weight to them."

Giorgio Sironi06/10/13
0 replies

Selenium screenshots for rendering tests

Selenium tests catch any issue that hampers real users from accessing your application, with a special focus on rendering problems and cross-browser issues. When creating screenshots with them take into account this advice to avoid false positives and always-red test suites.

Dustin Whittle06/10/13
1 replies

PHP Performance Crash Course, Part 1: The Basics

In this series I’ll tell you about the strategies and technologies that (in my experience) have been the most successful in improving PHP performance. To start off, however, we’ll talk about some of the easy wins in PHP performance tuning.

Andy Hawthorne06/10/13
0 replies

CentOS 6.4 and PHP 5.3

In the first article, I described how I set up CentOS 6.4 including with Apache to get ready for web development. In this article, I’ll describe what I did to get CentOS and PHP 5.3 up and running.

Mitch Pronschinske06/09/13
0 replies

Create your First Personal Kanban

See this common approach to creating your first personal Kanban board. All you need is a board or paper canvas with divisions and sticky notes.

Mark Needham06/08/13
0 replies

The Affect Heuristic

In my continued reading of Daniel Kahneman’s Thinking Fast and Slow I’ve reached the section which talks about the affect heuristic which seems particularly applicable to the technical decisions that we make.

Jim Bird06/08/13
0 replies

What's the Point of Application Penetration Testing?

Penetration testing is one of the bulwarks of an application security program: get an expert tester to simulate an attack on your system, and see if they can hack their way in. But how effective is application penetration testing, and what should you expect from it?

Jurgen Appelo06/08/13
0 replies

Yahoo CEO Mayer is Right and Wrong About Her Remote Work Claims

She said the main reason for this decision was that collaboration and communication are improved when people work together in the office, and when they can see each other face to face. Marissa Mayer was right. She was also wrong.

Allen Coin06/07/13
0 replies

Developing on the Cloud: Concerns and Solutions

For developers, deploying to a cloud environment comes with a large number of unknowns--particularly scalability, availability, performance, and security. Here's how these unknowns can be addressed.