• submit to reddit
Ayende Rahien07/23/14
0 replies

Avoid where in a reduce clause

We got a customer question about a map/reduce index that produced the wrong results. The problem was a problem between the conceptual model and the actual model of how Map/Reduce actually works.

Mike Bushong07/23/14
0 replies

Scenario planning for first-line managers

Almost every New Product Introduction process includes some placeholder slots to talk about risk. Everyone knows enough to put mitigation plans in these slots. But those mitigation plans are drafted and then ignored by the vast majority of managers.

Kin Lane07/23/14
0 replies

GitHub Commit Storytelling: Now or Later

When you are making GitHub commits you have to provide a story that explains the changes you are committing to a repository. Many of us just post 'blah blah’, ‘what I said last time", or any other garbage that just gets us through the moment. You know you’ve all done it at some point.

Mike Bushong07/22/14
0 replies

Network abstractions need equivalent of packet walkthrough

Whenever a new networking platform is evaluated, one of the early sales calls includes a packet walkthrough. But why?

Rob J Hyndman07/22/14
0 replies

I am not an econometrician

Econo­met­rics is often “the­ory dri­ven” while sta­tis­tics tends to be “data dri­ven”. I dis­cov­ered this in the inter­view for my cur­rent job when some­one crit­i­cized my research for being “data dri­ven” and asked me to respond.

Mike Cottmeyer07/22/14
0 replies

What is the ROI of Your Event?

So, where did our new event fall on a scale compared to the others? Did I feel like attendees received value and did I feel like we got a good return on our investment? Let me give a little comparison.

Alec Noller07/21/14
0 replies

DZone's 200th Refcard Released: Java Performance Optimization

Today, DZone released Refcard #200: Java Performance Optimization. To mark the significance of this milestone, this Refcard boasts a complete redesign - all the information you expect from a Refcard in a shiny new package!

David Winterbottom07/21/14
0 replies

Linking to Github

It's dangerous to link to lines or blocks of code on Github without explicitly specifying the commit hash in the URL. This emits the Github URL to the HEAD commit on the current branch, specifying the commit hash in the URL

Ayende Rahien07/21/14
0 replies

Introducing inefficiencies into RavenDB, on purpose

The administrators on the server noted the high I/O and that a single thread was constantly busy and decided that this is likely a hung thread. The long term fix was to actually make sure that we abort the operation after a while, report to the remote server that we scanned up to a point, and had nothing to show for it, and go back to the replication loop.

Mark Needham07/21/14
0 replies

R: ggplot: Problem automatically picking scale for difftime object

I thought it’d be interesting to create some visualisations around the times that people RSVP ‘yes’ to the various Neo4j events that we run in London. I tried to use ggplot to create a bar chart of the data. Unfortunately that resulted in this error:

Johanna Rothman07/21/14
0 replies

What is Your Minimum Agile Reading List?

I have created a Minimum Reading List for an Agile Transition. Note the emphasis on minimum. I could have added many more books to this list. But the problem I see is that people don’t read anything. They think they do agile if they say they do agile.

Phil Whelan07/21/14
0 replies

Release! Card Game Adds New Twist to Software Development

"Release!" is a card game about making software inspired by development strategies like Lean, Agile, and DevOps.

Chris Odell07/19/14
0 replies

Agile Decompiled : Incremental And Iterative Releases

Proponents of the Waterfall Model suggest that by doing all the design up front and making sure that each part of the process is correct before moving onto the next part, means that bugs are found sooner and therefore costs are reduced.

Jim Bird07/18/14
0 replies

Trust instead of Threats

According to Dr. Gary McGraw’s ground breaking work on software security, up to half of security mistakes are made in design rather than in coding. For the last 10 years we’ve been told that we are supposed to do this through threat modeling. What else can we do to include security in application design?

Alexey Kutuzov07/18/14
0 replies

Docker using private registry

There is an easy way to define Docker container using Dockerfile. The other way to do it is private Docker registry. I will install now MongoDB in a Docker container w/o Dockerfile