- Programmer Weekly
- Posts
- Programmer Weekly (Issue 99 March 31 2022)
Programmer Weekly (Issue 99 March 31 2022)
Programmer Weekly - Issue 99
Programmer Weekly
Welcome to issue 99 of Programmer Weekly. Let's get straight to the links this week.
Quote of the Week
"In carpentry, you measure twice and cut once. In software development, you never measure and make cuts until you run out of time." - Adam Morse
News
The software takes a protein's structure and designs proteins that stick to it.
Amazon launched AWS for games that will help developers create new gaming experiences with purpose-built services, solutions, and partners.
A new large scale supply chain attack has been observed targeting Azure developers with no less than 218 malicious NPM packages with the goal of stealing personal identifiable information.
Reading List
Let's explore the concepts of cohesion and coupling in depth: why they are so important, and how to concretely apply them.
You Build It You Run It is an operating model in which product teams build, deploy, operate, and support their own digital services. This playbook summarizes our thinking on when, why, and how to implement the You Build It You Run It operating model.
Hudl recently ran into some really strange networking failures in our testing environment — we tracked them down to a pretty obscure network setting in AWS EC2. If you’re interested in Chef or Linux debugging, AWS networking troubleshooting, or just love a good rabbit hole, read on.
In 2021, my team worked on migrating Wix’s 2000 microservices from self-hosted Kafka clusters to a multi-cluster Managed cloud platform (Confluent Cloud) in a seamless way that did not need to involve the owners of these services. The migration was done during regular traffic without any downtime. This post shares with you key design decisions we took, best practices and tips for this kind of migration.
Whether you’re an Ethereum developer, a blockchain developer, a web developer or just a curious person, this is the #1 guide to become a Solana developer. With extremely detailed steps so there’s no room for confusion along the way.
How do you actually go from a simple flag to Role Based Access Control (RBAC) and then to Attribute Based Access Control (ABAC), especially in a microservices environment?
Selecting the correct MTT* metric to improve your incident response is important. If the wrong metric is chosen, the improvements may get lost in the noise of a multivariable equation. This article reviews the various MTT* metrics available and discusses the best scenarios for selecting each one.
What is natural language processing? How does it work? Where is NLP used in the real world?
Learn how to create a color palette for the data visualizations in your organization.
Watch and Listen
Learn about Extended Reality / Augmented Reality from both a theoretical and practical perspective in this full course for beginners.. Learn to develop AR mobile applications and AR Filters for Instagram and Facebook from scratch. Learn concepts from scratch such as XR Fundamentals, Unity Engine, C#, Markerbased AR Development and AR Filter development.
Bob Ritchie, VP of Software at SAIC, thinks the traditional top-down leadership model is dead and the team-of-teams model is here to replace it.
Interesting Projects, Tools and Libraries
Apache APISIX provides rich traffic management features like Load Balancing, Dynamic Upstream, Canary Release, Circuit Breaking, Authentication, Observability, and more.
A low code Machine Learning tool that personalizes product listings, articles, recommendations, and search results in order to boost sales.
A fast, clean, customisable shell prompt for zsh, bash, fish, and more.
Simple visualization tool for your JSON data.
A dynamic tracing profiler for Linux.
BlocklyML is a simple visual programming Tool for python and ML. Built on Google Blockly
Hedy is a gradual programming language to teach children programming. Gradual languages use different language levels, where each level adds new concepts and syntactic complexity.
End-To-End Encrypted Environments. Protect API keys, encryption keys, credentials, and other secrets. Run servers, scripts, tests, and everything else with the latest config.
A modal keyboard-driven virtual pointer.
Our Other Newsletters
- A free weekly newsletter featuring the best hand curated news, articles, tools and libraries, new releases, jobs etc related to Python.
- A free weekly newsletter for entrepreneurs featuring best curated content, must read articles, how to guides, tips and tricks, resources, events and more.