The document provides guidance on troubleshooting production systems. It discusses the importance of production and troubleshooting, and choosing the appropriate tools and techniques for diagnosis. An example problem is presented where a web application hangs sometimes for 0-60 seconds. Various system tracing tools are used like strace and lsof to diagnose the issue. It is discovered the problem is Apache child processes getting tied up waiting for client connections due to the default 15 second keepalive timeout value.
The document discusses improving security user interfaces (UIs) on web browsers. It proposes replacing the ubiquitous padlock icon with an identity indicator called "Larry" that clearly shows website identity using extended validation certificates. Larry is evaluated against five rules for good security UI ("MRRAB"): meaningful, relevant, robust, available, and brave. The document also considers other aspects of security UI and explores ideas like using social connections and past browsing history to help users identify legitimate websites. It aims to spark discussion on making security indicators more understandable and effective for users.
The document provides guidance on troubleshooting production systems. It discusses the importance of production and troubleshooting, and choosing the appropriate tools and techniques for diagnosis. An example problem is presented where a web application hangs sometimes for 0-60 seconds. Various system tracing tools are used like strace and lsof to diagnose the issue. It is discovered the problem is Apache child processes getting tied up waiting for client connections due to the default 15 second keepalive timeout value.
The document discusses improving security user interfaces (UIs) on web browsers. It proposes replacing the ubiquitous padlock icon with an identity indicator called "Larry" that clearly shows website identity using extended validation certificates. Larry is evaluated against five rules for good security UI ("MRRAB"): meaningful, relevant, robust, available, and brave. The document also considers other aspects of security UI and explores ideas like using social connections and past browsing history to help users identify legitimate websites. It aims to spark discussion on making security indicators more understandable and effective for users.
Una mujer encuentra un sapo atrapado mientras juega golf. El sapo le ofrece concederle tres deseos a cambio de su liberación, con la condición de que cualquier deseo que pida para sí misma, su marido lo recibirá diez veces más. La mujer desea ser la más bella y rica del mundo, sin preocuparse por cómo afectará a su marido. Para su tercer deseo, pide tener un ligero ataque al corazón. El sapo concede los deseos, pero el ataque al corazón resulta fatal para la mujer, mientras que
DBSlayer is a middleware that allows web applications to access databases through HTTP and JSON. It provides a simple way to query databases by sending SQL statements in a JSON-formatted HTTP request and receiving the results of the query in the HTTP response also formatted in JSON. It aims to be independent, scalable, flexible and simple. Some features include connection pooling, load balancing queries across multiple databases, and automatic failover to alternate databases. It works by acting as an intermediary between web applications and databases, handling the network communication and database access transparently through its HTTP/JSON interface.
The document discusses various marketing strategies that open source projects can use without a budget. It suggests using word of mouth, presentations, writing articles, press coverage, a good project website, documentation, predictable release cycles, and befriending the media. Traditional marketing may not work for open source so the document outlines affordable guerilla techniques like growing an online following and sharing code.
HTTPS uses SSL to encrypt communication between a user's computer and a server to protect against man-in-the-middle attacks. However, websites may only use password authentication over HTTPS, leaving emails and other traffic unencrypted. To improve security, users should force encryption by changing URLs to HTTPS, use dedicated email and messaging clients instead of web browsers, and opt for client applications when possible to encrypt more of their online activities. Nothing provides 100% security but these steps can make a user 80-90% safe.
This document discusses a resource-oriented approach to data services using REST, Python and RDF. It describes how data can be transformed into data services by creating data resources that represent the data and can be composed into transformation pipelines. The pipelines themselves are also represented as resources, allowing new data services to be incrementally composed from existing ones. The document also provides an overview of the SnapLogic open source data integration toolkit.
This document discusses Rails plugins and best practices for managing them. It introduces different tools for installing, updating, and managing plugins like script/plugin, Piston, and Gems. It warns that plugins load alphabetically, dependencies between plugins can cause issues, and too many plugins or improper use of plugins can slow down applications. The document advocates treating plugins similarly to applications with versioning, testing, and continuous integration.
This document discusses how to use the Hoe gem to automate the creation and sharing of Ruby gems. It recommends installing Hoe with the --include-dependencies flag to also install Rubyforge. Using Hoe sets up a gem project with common files and tasks like testing, checking the manifest, building the gem, and publishing documentation.
The document provides guidance and best practices for working with the Linux kernel community, including the importance of cooperation, following open source licensing models, releasing code early and often, avoiding reinventing existing solutions, following documentation and coding styles, writing constructive comments, asking for help, practicing good listening skills, keeping comments polite and constructive, and including positive feedback. It also includes examples of good and bad code comments.
Bolivia has a mountainous highway nicknamed "the road of death" located in Bolivia that is dangerous to drive on. The document discusses driving in Bolivia and mentions a highway there known as "the road of death" due to its treacherous conditions.
This document discusses various Ruby on Rails concepts including metaprogramming, blocks, reflection, ActiveRecord associations and observers. It provides code examples of how these concepts are implemented in Rails, such as how has_many associations generate collection methods, how method_missing enables dynamic finders, and how observers are called via callbacks.
The document discusses how the world can be a wonderful place. It suggests taking time to appreciate life's simple pleasures and recognizing the beauty that exists in nature and human relationships. Overall, the message conveyed is that despite challenges, the world offers much to find wonder and joy in.
Penny Leach presents on Mahara, an open source eportfolio application. She begins with introductions, explaining that she is a lead Mahara developer from New Zealand. She then defines eportfolios as student-driven collections of learning artifacts or evidence. The presentation covers the history of Mahara, including its origins in the New Zealand open source elearning project. It discusses Mahara's core features such as artifacts, views, templates and access controls. Future roadmap items include improved Moodle integration and support for potential employer access.
Uma carta de um amigo americano argumenta que os brasileiros pagam mais por serviços como água, eletricidade, combustível e impostos do que os americanos, apesar de o Brasil ter mais recursos naturais. O autor brasileiro concorda que o Brasil precisa parar de se concentrar na aparência de riqueza e fazer mudanças para promover dignidade e bem-estar do povo.
The document provides 10 taboos for intelligent aged persons to achieve happiness. The taboos include not worrying about adult children, respecting their privacy and independence; finding one's own interests beyond family; dealing with emotions through art instead of complaining; appreciating others' efforts; avoiding family disputes; accepting illness and treatment; not being overly skeptical of others; and having a religious faith and optimistic outlook.
An ant works hard without supervision and is very productive. A lion notices this and thinks she could produce even more with oversight. He hires a cockroach supervisor who implements extensive paperwork and meetings. This decreases the ant's productivity. More managers are hired, further reducing productivity until an audit reveals the department is overstaffed. The ant is fired for a poor attitude. The fable warns about over-management stifling productivity.