|
|
Welcome to issue 56 of Programmer Weekly. Let's get straight to the links this week.
|
|
Quote of the Week
"There is not now, nor has there ever been, nor will there ever be, any programming language in which it is the least bit difficult to write bad code." - Flon's Law
News
From conversation to code
Microsoft introduces its first product features powered by GPT-3.
4MB Game Jam 2021
4MB Game Jam is a one month long game jam about creating a game that fits within four megabytes. The submissions are due by June 24th 2021.
Vulnerabilities in billions of Wi-Fi devices let hackers bypass firewalls
FragAttacks let hackers inject malicious code or commands into encrypted Wi-Fi traffic.
Frontier Supercomputer to Get World's Fastest Storage: 75 TB/s, 15 Billion IOPS, 700 PetaBytes
OLCF's Frontier is set to use a hybrid multi-tier storage sub-system with 700PB capacity and up to 75TB/s throughput.
IBM’s Project CodeNet will test how far you can push AI to write software
IBM’s AI research division has released a 14-million-sample dataset to develop machine learning models that can help in programming tasks. While there’s a scant chance that machine learning models built on the CodeNet dataset will make human programmers redundant, there’s reason to be hopeful that they will make developers more productive.
Snyk uncovers supply chain security vulnerabilities in Visual Studio Code extensions
We have been witnessing an ever growing amount of supply chain security incidents in the wild. Everything from open source package managers security flaws being exploited to continuous integration systems being compromised to software artifacts being backdoored. And now, those incidents are starting to extend to the place where developers spend most of their time: their integrated development environment, and specifically the Visual Studio Code IDE.
Reading List
Floppinux - An Embedded Linux on a Single Floppy
An extensive yet simple tutorial/workshop on how to make embedded Linux distribution under 1.44MB.
Leaky John Deere API’s: Serious Food Supply Chain Vulnerabilities Discovered
Discovering who owns John Deere tractors, harvesters, and implements. What farm they are at. How old they are. And how long they are “subscribed” for.
Hacker's guide to deep-learning side-channel attacks: the theory
Learn the concepts behind deep-learning side-channels attack, a powerful cryptanalysis technique, by using it to recover AES cryptographic keys from a hardware device.
Hacking third-party APIs on the JVM
In this post, we are going through some alternatives that allow you to make third-party APIs behave in a way that their designers didn’t intend to.
Extreme HTTP Performance Tuning: 1.2M API req/s on a 4 vCPU EC2 Instance
This post will walk you through the performance tuning steps that I took to serve 1.2 million JSON "API" requests per second from a 4 vCPU AWS EC2 instance.
The Full Story of the Stunning RSA Hack Can Finally Be Told
In 2011, Chinese spies stole the crown jewels of cybersecurity—stripping protections from firms and government agencies worldwide. Here’s how it happened.
An Introduction to Knowledge Graphs
The goals in this post are to (a) explain the basic terminology, concepts, and usage of KGs, (b) highlight recent applications of KGs that have led to a surge in their popularity, and (c) situate KGs in the overall landscape of AI.
How to get HTTPS working on localhost
A complete tutorial on how to get HTTPS working on localhost or any local domains. The main part is about manual SSL certificate creation. It is worth to now almost low-level details.
The Complete Guide to Full Stack Ethereum Development
In this article, you'll learn how to build full stack dApps with React, Ethers.js, Solidity, and Hardhat.
A robust distributed locking algorithm based on Google Cloud Storage
Coordinate concurrent workloads with distributed locks! But how to build one that's cheap, robust and maintenance-free? A proposed algorithm.
Should we rebrand REST?
The author argues the case for consigning the term "REST API" to history. In its place we should adopt the terms "HTTP API" and "hypermedia API", which better differentiate two distinctive designs for the programmatic interfaces of web services.
Cryptography from the Ground Up
Introducing WebContainers: Run Node.js natively in your browser
The Easiest Way to Debug Kubernetes Workloads
An early look at Postgres 14: Performance and Monitoring Improvements
Watch and Listen
Easy JavaScript Game Development with Kaboom.js
Learn how use JavaScript and Kaboom.js to create three classic video games. You will create games similar to Space Invaders, Super Mario Bros. and Legend of Zelda. Kaboom.js makes makes it easier and quicker to create games.
Developers and Security with Rey Bango
There's Developers, and there's Infosec, right? Folks that sling code, and the security people that complain about the coders. Rey Bango talks to Scott about the mindset that developers should consider today - where security is baked into the process from day 0.
Blocking the haters as a service
A chat with Tracy Chou, CEO of Block Party, about using software to build anti-harassment tools.
Ask Anything with a Retired Microsoft Developer!
Interesting Projects, Tools and Libraries
Dev Library
Dev Library is a showcase of what developers like you have built with Google technologies. Browse and learn, or submit your own!
ohut
A simple git-based remote pair programming tool.
mkcert
A simple zero-config tool to make locally trusted development certificates with any names you'd like.
Flat Data
Flat explores how to make it easy to work with data in git and GitHub. It builds on the “git scraping” approach pioneered by Simon Willison to offer a simple pattern for bringing working datasets into your repositories and versioning them, because developing against local datasets is faster and easier than working with data over the wire.
Typehole
TypeScript development tool for Visual Studio Code that helps you automate creating the initial static typing for runtime values.
Jerikan
A configuration management system for network teams.
zap-db
An easy to use JSON database written with ease of setup and memory management of slack bots in mind.
vcluster
Create fully functional virtual Kubernetes clusters - Each vcluster runs inside a namespace of the underlying k8s cluster. It's cheaper than creating separate full-blown clusters and it offers better multi-tenancy and isolation than regular namespaces.
Ahoy
An easy-to-use GUI for Helm.
DeskX
Program for remote control of a computer in a local network.
Upcoming Events
Virtual: Low-code Marathon
10-day business marathon to guide IT and digital leaders on how to build a successful digital-first organization using low-code/no-code technology.
Virtual: OpenJS World 2021
Join JavaScript professionals including developers, software engineers, developer advocates and business leaders at the OpenJS virtual global conference. Connect, learn and collaborate with community members from projects including AMP, Dojo, Electron, and Node.js.
Virtual: F8 Refresh
F8 Refresh will feature the latest product tools to help you build across Facebook technologies, as well as technical deep-dive sessions, demos, and panels – all with the goal of enabling your growth.
|
|
Python Weekly - A free weekly newsletter featuring the best hand curated news, articles, tools and libraries, new releases, jobs etc related to Python.
Founder Weekly - A free weekly newsletter for entrepreneurs featuring best curated content, must read articles, how to guides, tips and tricks, resources, events and more.
|
|
|
|
|
|
|