Top elixir Geeks


Check out snippets of the blog postings. Click on the link to view the full post at the original site as the author intended.

rseguy

How I fixed a rotten door jamb

rseguy  on  4/11/2016

In this post I’ll detail how I fixed the bottom part of a rotten door jamb. The picture below shows how rotten the jamb is. You’ll notice that I removed the door while fixing the jamb, since the impacted jamb was the one carrying the weight of the door. I also removed the exterior mould brick, the interior trim, and the baseboard.
The first thing I did was to completely remove the rotten portion of the jamb. For that, I identified how much I had to remove (which happened to be way below the lower hinge). I then nailed a piece of wood (which I ensured was leveled) so that the top of the piece of wood would be slighty above the rotten portion.
On the next picture, you can see that I used the previously nailed piece of wood as a guide to
[...]

nolanlawson

Introducing the Cordova SQLite Plugin 2

nolanlawson  on  4/10/2016

TL;DR: I rewrote the Cordova SQLite Plugin; it’s faster and better-tested. Try it out! For better or worse, WebSQL is still a force to be reckoned with in web development. Although the spec was deprecated over 5 years ago, it still lives on, mostly as a fallback from its more standards-friendly successor, IndexedDB. (See LocalForage, […]

Webapps cordova sqlite 
nolanlawson

High-performance Web Worker messages

nolanlawson  on  2/29/2016

In recent posts and talks, I’ve explored how Web Workers can vastly improve the responsiveness of a web application, by moving work off the UI thread and thereby reducing DOM-blocking. In this post, I’ll delve a bit more deeply into the performance characteristics of postMessage(), which is the primary interface for communicating with Web Workers. […]

Webapps performance web workers 
nolanlawson

How to think about databases

nolanlawson  on  2/8/2016

As a maintainer of PouchDB, I get a lot of questions from developers about how best to work with databases. Since PouchDB is a JavaScript library, and one with fairly approachable documentation (if I do say so myself), many of these folks tend toward the more beginner-ish side of the spectrum. However, even with experienced […]

Webapps databases performance 
resmo

Release Strategies

resmo  on  1/8/2016

Every now end then I see discussions about how to do releases, how the tagging should be done, if and what git workflow should be used. I would like to share some thoughts about how I do releases and how I like to see how a software project does releases from the user's perspective.

Releases

What are releases? Releases are named snapshots of a software development cycle, called versions. So if you do software development you should provide versions. A version of a software tells the user, what he can expect from it, which changes has been made, what bugs has been fixed, what features has been implemented.

Versioning

There are basically two strategies of versioning a release, a date kind of style YYMMDD.PATCH or semantic versioning MAJOR

[...]

resmo

Crowdfunding Ansible CloudStack Modules

resmo  on  1/2/2016

Update 2016-01-09:

  • Mew module:
    • cs_resourcelimits

Update 2016-01-03: New modules

Not yet open sourced, but fully integration tested and idempotence aware:

  • cs_zone - Create, update and remove zones.
  • cs_pod - Create, update and remove pods.
  • cs_cluster - Create, update and remove clusters.
  • cs_instance_facts - Gathering facts of an instance from the API.
  • cs_configuration - Manages global, zone, account, storage and cluster configurations.

Integration tests tasks: 515

State of the play

The last 13 months have been amazing: I created 22 Ansible CloudStack modules, ~18'000 lines added, additional ~2'700 lines changed in ~171 commits, developped 15 integration test roles covering more than 300 tasks, for automated testing on a

[...]

nolanlawson

How to fix a bug in an open-source project

nolanlawson  on  12/28/2015

So, you’ve found a bug in an open-source project. First off: don’t panic! This is perfectly normal. Software is written by humans, and humans make mistakes. You might also be thinking to yourself, “Gee, I’d love to fix this bug.” I mean, who wouldn’t want to be the hero who swoops in and fixes a […]

Open source 
sbagmeijer

Bad actors race to exploit Juniper firewall vulnerability

sbagmeijer  on  12/19/2015

Now that Juniper has created a patch for its vulnerable firewall/VPN appliances, bad actors are setting to work reverse engineering the flaw so they can exploit devices that users don’t patch, and also make a profit by selling their exploits to others.

“That’s what they do,” says John Pironti, president of IP Architects, who says he spent Friday responding...

Bad actors race to exploit Juniper firewall vulnerability [...]

sbagmeijer

Microsoft pursues analytics ambitions with Metanautix acquisition

sbagmeijer  on  12/19/2015

[​IMG]

Microsoft has furthered its pursuit of enterprise analytics with theacquisition of Metanautix, a company that makes it possible for businesses to pull together all their data and gain insights into it. Metanautix's product can pull information in from a variety of private and public cloud data sources including traditional data warehouses, NoSQL databases like Cassandra...

Microsoft pursues analytics ambitions with Metanautix acquisition [...]

sbagmeijer

Team demonstrates 'hybrid' logic gate as work towards quantum computer continues

sbagmeijer  on  12/19/2015

Quantum logic gates between different isotopic species are possible, can be driven by a relatively simple laser system, and can work with precision beyond the so-called 'fault-tolerant threshold' precision of approximately 99 percent -- the precision necessary to implement the techniques of quantum error correction, without which a quantum computer of useful size cannot be built, report...

Team demonstrates 'hybrid' logic gate as work towards quantum computer continues [...]

sbagmeijer

Sanders presidential campaign accuses Democrats of dirty data tricks

sbagmeijer  on  12/19/2015

IT security snafu leads to two tribes going to war


A hacking row is splitting the Democratic Party's presidential campaign after an incident with the party's database provider.…

Continue reading... [...]

sbagmeijer

Encryption, surveillance discussed on CFR panel on homeland security, ISIS

sbagmeijer  on  12/18/2015

Members of a panel on the "Homeland Security Implications of ISIS Attacks" at the Council on Foreign Relations talked about encryption and surveillance in the effort to defeat terrorist groups.[​IMG]

Continue reading... [...]

sbagmeijer

Juniper issues patch for ScreenOS to eliminate unauthorized code

sbagmeijer  on  12/18/2015

Juniper Networks issued a security warning and patches centered on its ScreenOS firewall management software to eliminate illicit code that could lead to an attacker gaining administrative control to the company's NetScreen devices.[​IMG]

Continue reading... [...]

sbagmeijer

Congress Passes Long-stalled Cybersecurity Bill

sbagmeijer  on  12/18/2015

Congress on Friday passed legislation to fight cyber threats, pushing the measure through by tucking it into a sprawling government funding bill, after earlier failed attempts.

read more

[​IMG]...

Congress Passes Long-stalled Cybersecurity Bill [...]

sbagmeijer

Researcher claims Facebook tried to gag him over critical flaw

sbagmeijer  on  12/18/2015

Zuck's CSO denies bullying charges, confirms bounty payout


A security researcher who found a critical flaw in Instagram is claiming that Facebook's chief security officer Alex Stamos tried to get him fired over the discovery.…

Continue reading... [...]

sbagmeijer

DDoS attacks up 180 percent in Q3 2015: Akamai

sbagmeijer  on  12/18/2015

Akamai's Q3 2015 State of the Internet - Security Report offered up a mixed bag of news indicating a very large increase in distributed denial of service attacks, while noting the length and severity of the incidents were down.[​IMG]

Continue reading... [...]

sbagmeijer

An update on SHA-1 certificates in Chrome

sbagmeijer  on  12/18/2015

Posted by Lucas Garron, Chrome security and David Benjamin, Chrome networking

As announced last September and supported by further recent research, Google Chrome does not treat SHA-1 certificates as secure anymore, and will completely stop supporting them over the next year. Chrome will discontinue support in two steps: first, blocking...

An update on SHA-1 certificates in Chrome [...]

sbagmeijer

Industry pros, tech firms displeased with cyber bill

sbagmeijer  on  12/18/2015

Cybersecurity legislation buried within a $1.1 trillion government spending agreement that was needed to prevent a government shutdown got the nod from the House.[​IMG]

Continue reading... [...]

sbagmeijer

Google sets aside $1M in grants to boost security of Drive

sbagmeijer  on  12/18/2015

Google has earmarked $1 million in grants to help keep its users' files safe in the cloud-based Google Drive.[​IMG]

Continue reading... [...]

sbagmeijer

Dell's SecureWorks files for IPO

sbagmeijer  on  12/18/2015

SecureWorks, the cybersecurity division of Dell, put in paperwork with the U.S Securities and Exchange Commission on Thursday to initiate an IPO.[​IMG]

Continue reading... [...]

sbagmeijer

A lesson from Juniper. What’s in your software?

sbagmeijer  on  12/18/2015

Frankly, I’m surprised. Is it the revelation that Juniper had “unauthorized code” in their Netscreen product? Is it that a third party could reportedly remotely access these systems? Is it that VPN traffic could be decrypted?

Nope. In fact, none of the above.

The part of this story that really caught my attention was fact that this, for all intents and purposes, the first time we’re hearing about something like this in a security product. Yes, we've heard of...

A lesson from Juniper. What’s in your software? [...]

sbagmeijer

Landry's investigates a potential POS attack

sbagmeijer  on  12/18/2015

The restaurant and hospitality company Landry's is reporting that some of its customers have had unauthorized charges placed on their payment cards after they were used at a Landry's establishment.[​IMG]

Continue reading... [...]

sbagmeijer

Better cybersecurity might have saved the Death Star

sbagmeijer  on  12/18/2015

So, basically the Death Star's destruction in the original Star Wars film was due to a major data breach on behalf of the Empire.[​IMG]

Continue reading... [...]

sbagmeijer

How the brain can handle so much data

sbagmeijer  on  12/18/2015

Humans can categorize data using less than 1 percent of the original information, and validated an algorithm to explain human learning -- a method that also can be used for machine learning, data analysis and computer vision -- researchers report.[​IMG]

Continue...

How the brain can handle so much data [...]

sbagmeijer

Wi-Fl blocking issue prompts convention industry to band together

sbagmeijer  on  12/18/2015

Operators of convention centers and other public assembly venues are joining forces to avoid becoming the next Marriott or Hilton in the eyes of an FCC Enforcement Bureau that’s been cracking down on Wi-Fi blockers.

Wi-Fi blocking has become a hot button issue across the hospitality and convention center industry, as well as across the wireless LAN industry, in light of big FCC fines against outfits found to have been blocking use of wireless hotspots by those who have a legal right to...

Wi-Fl blocking issue prompts convention industry to band together [...]

sbagmeijer

IDG Contributor Network: Building malware defenses: Control email, web browsers, and ports

sbagmeijer  on  12/18/2015

Our last article looked at applying Critical Security Controls 4, 5, and 6 to your organization, covering vulnerability assessment, administrative privileges, and audit logs. Now it’s time to move on to CSCs 7, 8, and 9.

Email programs and web browsers are still the most common points of entry for attackers, too many companies have woefully inadequate...

IDG Contributor Network: Building malware defenses: Control email, web browsers, and ports [...]

clofresh

How iHeartRadio monitors Docker performance

clofresh  on  12/15/2015

There was just one thing about Docker that made iHeartRadio unhappy: they had no visibility into service- or container-level resource consumption.

The post How iHeartRadio monitors Docker performance appeared first on Datadog.

Datadog docker 
augiedb

Core Elixir: Path.relative_to/2

augiedb  on  12/15/2015

Sit back, this one has tangents on top of tangents.

(Don’t I say that every time?)

(If you’re tangential to a tangent, are you asymptotic?)

According to the documentation, Path.relative_to/2 does this:

Returns the given path relative to the given from path. In other words, it tries to strip the from prefix from path.

Sounds like fun. Even better, it’s recursive. Eventually.

This function does not interact with the filesystem. It does it all via string manipulation, without any regexes.

Should the path not contain the from, it returns the full path back to the user, like so:

1
2
  iex> Path.relative_to("/usr/local/foo", "/etc")
  "/usr/local/foo"

Otherwise, it returns the

[...]

clofresh

Datadog now supports OpenStack monitoring

clofresh  on  12/14/2015

Datadog now natively monitors OpenStack Nova. OpenStack is an open-source cloud-computing software platform [...]

The post Datadog now supports OpenStack monitoring appeared first on Datadog.

Datadog Integration New Feature openstack 
clofresh

Monitoring OpenStack Nova

clofresh  on  12/14/2015

In this series of posts, we dive into Nova, the OpenStack Compute module, and explain its key metrics and other useful data points.

The post Monitoring OpenStack Nova appeared first on Datadog.

Metrics openstack 
clofresh

Collecting metrics and notifications from OpenStack Nova

clofresh  on  12/14/2015

Part 2 of this series shows you how to collect OpenStack metrics from a variety of sources to give you a complete view of your stack.

The post Collecting metrics and notifications from OpenStack Nova appeared first on Datadog.

Metrics openstack 
clofresh

OpenStack monitoring with Datadog

clofresh  on  12/14/2015

With Datadog, you can collect OpenStack metrics for visualization, alerting, full-infrastructure correlation, and more. Datadog will automatically collect [...]

The post OpenStack monitoring with Datadog appeared first on Datadog.

Metrics openstack 
janetriley

Talk Roundup: Agile Architecture, Graphs, and Predicting Airfare Prices

janetriley  on  12/14/2015

Molly Dishman & Martin Fowler – Agile Architecture 2015 O’Reilly Software Architecture Conf Complexity arises from irreversibility. How do you design software to accommodate the inevitable changes? A better metaphor than architects is city planners,...

talks 
wyukawa

[running]青島太平洋マラソン走ってきた

wyukawa  on  12/13/2015

結果はネットタイムが4時間14分6秒。runtasticで取ったラップが下記の通り。30km以降に落ち込んでます。 大会自体は運営もしっかりしていて良い大会でした。最も印象に残っているのは応援による後押しがすごいこと。特に街中を走っている15kmから20kmの辺りはすごかったです

running 
clofresh

Monitoring ElastiCache performance metrics with Redis or Memcached

clofresh  on  12/10/2015

An efficient cache can significantly increase your application’s performance and user navigation speed. That’s why key performance metrics need to be well understood and continuously monitored, using both generic ElastiCache metrics collected from AWS CloudWatch but also native metrics from your chosen caching engine.

The post Monitoring ElastiCache performance metrics with Redis or Memcached appeared first on Datadog.

Alerting AWS Metrics 
clofresh

Collecting ElastiCache metrics + its Redis/Memcached metrics

clofresh  on  12/10/2015

This article covers three different ways to access ElastiCache metrics from AWS CloudWatch, as well as the collection of native metrics from both caching engines.

The post Collecting ElastiCache metrics + its Redis/Memcached metrics appeared first on Datadog.

AWS Metrics 
clofresh

How Coursera monitors ElastiCache and Memcached performance

clofresh  on  12/10/2015

With more than 1,000 courses and millions of students, Coursera uses ElastiCache to cache course metadata, as well as membership data for courses and users. In this article we take you behind the scenes with Coursera’s engineering team to learn their best practices and tips for using ElastiCache, keeping it performant, and monitoring it with Datadog.

The post How Coursera monitors ElastiCache and Memcached performance appeared first on Datadog.

Alerting AWS Datadog Graphing Integration Metrics aws coursera elasticache memcached 
avdi

The real 10x developer

avdi  on  12/8/2015

Ask me for a 10x developer, and I’ll show you a hacker who can take a list of 10 tickets, and reject 9 of them because they don’t appreciably advance the project goals. Like some kind of “project manager”, or something.

Uncategorized 
jvns

Women in Machine Learning 2015 (fun!!!)

jvns  on  12/8/2015

I went to the Women in Machine Learning conference yesterday (part of NIPS). It was SO FUN. I never go to academic conferences, and talking to grad students about their research and what methods they think are exciting is amazing. I actually liked it a lot more than an industry conference because everything was so alien & unfamiliar to me and everyone knew way more about their field than me. I learned more than I did by going to (for instance) PyCon, which is a fantastic industry conference.

It really made me want to reconsider what conferences I go to, and to go to more conferences in fields I’m less familiar with.

The organizers did a great job putting it together and the talks were really good. Here is some stuff I thought was

[...]

avdi

The Inescapable Pragmatism of Procedures

avdi  on  12/4/2015

Dr. Ben Maughan writes: At the moment I am rewriting some LaTeX notes into org mode to use in lecture slides. This involves several repetitive tasks, like converting a section heading like this \subsection{Object on vertical spring} into this ** Object on vertical spring Whenever I come across a problem like this, my first inclination […]

Rants 
falood

[Elixir ORM #2] `~>` 和 `

falood  on  12/4/2015

首先列一下需求吧: C/S 模式,需要在当前 node 调用,同时需要在其它 node 通过 :rpc.cal …

Read more »

开发 Elixir 
henrik

Elixir block keywords

henrik  on  12/3/2015

Exploring Elixir, I tried this:

defmodule Example do
  def foobar(do: _, else: _) do
  end
end

Example.foobar do
 IO.puts "true"
else
 IO.puts "false"
end

And it worked. Well, in a sense. The code runs, but it outputs both “true” and “false”.

What’s going on here? Let’s try another experiment:

IO.inspect do
  "true"
else
  "false"
end

# => [do: "true", else: "false"]

Turns out this is language-level syntactic sugar (e.g. 1, 2, 3) that desugars to a plain keyword list. And that explains why the code above would output both “true” and “false” – it’s equivalent to

Example.foobar([do: IO.puts("true&
[...]

clofresh

How to monitor Cassandra performance metrics

clofresh  on  12/3/2015

Apache Cassandra is known for its scalability and fault-tolerance, but like any critical piece of infrastructure it must be carefully monitored to ensure optimal performance. This article will walk through which performance metrics—throughput, latency, disk usage, and so on—you should be monitoring to make sure Cassandra is performing as expected.

The post How to monitor Cassandra performance metrics appeared first on Datadog.

Alerting Databases Metrics cassandra databases NoSQL 
carlosgaldino

Defusing a binary bomb with - Part 3

carlosgaldino  on  12/3/2015

This post is part of a series where I show how to defuse a binary bomb by reading assembly code and using gdb. You might want to read the other parts if you haven't yet.

Following the usual process, after defusing the second phase we were challenged to defuse the third one:

Welcome to my fiendish little bomb. You have 6 phases with
which to blow yourself up. Have a nice day!
Border relations with Canada have never been better.
Phase 1 defused. How about the next one?
1 2 4 8 16 32
That's number 2.  Keep going!

The corresponding instructions on main are the following:

400e5b: e8 64 07 00 00          callq  4015c4 <phase_defused>
400e60: bf ed 22 40 00          mov    $0x4022ed,%edi
400e65: e8 a6 fc ff ff          callq  400b10 
[...]

ostinelli

Setting up multiple databases in Rails: the definitive guide

ostinelli  on  12/2/2015

There are different reasons why you might consider having multiple databases in your Ruby on Rails application. In my specific case scenario, I needed to store large quantities of data representing user behavior: clicks, pages visited, historical […]

The post Setting up multiple databases in Rails: the definitive guide appeared first on ostinelli|net.

Ruby generator heroku multiple databases rake ror rspec ruby on rails schema 
ostinelli

Setting up multiple databases in Rails: the definitive guide

ostinelli  on  12/2/2015

There are different reasons why you might consider having multiple databases in your Ruby on Rails application. In my specific case scenario, I needed to store large quantities of data representing user behavior: clicks, pages visited, historical […]

The post Setting up multiple databases in Rails: the definitive guide appeared first on ostinelli|net.

Ruby generator heroku multiple databases rake ror rspec ruby on rails schema 
szabgab

Content Marketing experts

szabgab  on  12/2/2015

There are many people who will try to help you make money online. I have been following some of them. They all provide a lot of great free advice and all of them also provide courses if you really want to spend money.

For the full article visit Content Marketing experts

money, SEO 
avdi

Contempt as a sign of organizational incompetence

avdi  on  12/1/2015

A few months back I wrote on my personal journal about how incompetently-written firmware in a VTech child’s camera led to my 5 year old daughter losing cherished memories. I also recorded their dismissive response to a flaw that would be considered recall-worthy in any camera made for adults. Sadly, there is a deeply ingrained […]

Rants 
steveklabnik

DOCember: documentation + December

steveklabnik  on  12/1/2015

There are few things I appreciate more than using software projects that have good documentation. When I’m new to the project, documentation is invaluable for helping me get going. When I’m not new, good documentation helps me get the information I need to :shipit:.

About a month ago, I was tweeting about this topic, and several of us came up with an idea: similar to how November is National Novel Writing Month, why not have a similar month for programming?

Here’s the idea: in December, let’s try to work on the documentation for the projects

[...]

janetriley

What I’ve Been Watching

janetriley  on  12/1/2015

I watch a lot of conference talks. Too often, I don’t have the link handy when I want to pass it on. I’m going to start writing regular roundups so they’re close at hand. Chad...

talks