The following rules of programming style are excerpted from the book "The Elements of Programming Style" by Kernighan and Plauger, published by McGraw Hill. Here is quote from the book: "To paraphrase an observation in The Elements of Style by Strunk and White, the rules of programming style, like those of English, are sometimes broken, even by the best writers. When a rule is broken, however, you will usually find in the program some compensating merit, attained at the cost of the violation. Unless you are certain of doing as well, you will probably do best to follow the rules."
- Jim Weirich: The Building Blocks of Modularity – http://goo.gl/g4Nk
- Jim Weirich: SOLID Ruby – http://goo.gl/z3jd
- Sandi Metz: SOLID Object-Oriented Design – http://goo.gl/PDn6T
- Sandi Metz: Less – The Path to Better Design – http://goo.gl/VuTl4
- Demeter is for Encapsulation – http://is.gd/eeyLx
- Opinionated Modular Code – http://is.gd/eeyXm
- Scaling to Hundreds of Millions of Requests – http://vimeo.com/12814529
- Confident Code – http://goo.gl/VFLX
- Destroy All Software Screencasts – https://www.destroyallsoftware.com/screencasts
- Corey Haines: Fast Rails Tests – http://goo.gl/Va2gb
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
0 = Success | |
1 = Operation not permitted | |
2 = No such file or directory | |
3 = No such process | |
4 = Interrupted system call | |
5 = Input/output error | |
6 = No such device or address | |
7 = Argument list too long | |
8 = Exec format error |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Links | |
---- | |
* Jim Weirich: The Building Blocks of Modularity – http://goo.gl/g4Nk | |
* Jim Weirich: SOLID Ruby – http://goo.gl/z3jd | |
* Sandi Metz: SOLID Object-Oriented Design – http://goo.gl/PDn6T | |
* Sandi Metz: Less – The Path to Better Design – http://goo.gl/VuTl4 | |
* Demeter is for Encapsulation – http://is.gd/eeyLx | |
* Opinionated Modular Code – http://is.gd/eeyXm | |
* Scaling to Hundreds of Millions of Requests – http://vimeo.com/12814529 | |
* Confident Code – http://goo.gl/VFLX |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#------------------------------------------------------------------------------# | |
# vi: set sw=4 ts=4 ai: ("set modeline" in ~/.exrc) # | |
#------------------------------------------------------------------------------# | |
# Config file : ~/.tmux.conf # | |
# # | |
# Author : Ton Kersten The Netherlands # | |
#------------------------------------------------------------------------------# | |
# I use all Alt-Keys instead of Ctrl. This because I use a lot of Ctrl in | |
# Vim and so on and I don't like to use the Prefix all the time. |
- General Background and Overview
- Probabilistic Data Structures for Web Analytics and Data Mining : A great overview of the space of probabilistic data structures and how they are used in approximation algorithm implementation.
- Models and Issues in Data Stream Systems
- Philippe Flajolet’s contribution to streaming algorithms : A presentation by Jérémie Lumbroso that visits some of the hostorical perspectives and how it all began with Flajolet
- Approximate Frequency Counts over Data Streams by Gurmeet Singh Manku & Rajeev Motwani : One of the early papers on the subject.
- [Methods for Finding Frequent Items in Data Streams](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.187.9800&rep
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
THEO SCHLOSSNAGLE (Circonus) - Techniques and tools for a coherent discussion about performance in complex architectures | |
MITCHELL HASHIMOTO (Hashicorp) - Automating the Modern Datacenter, Development to Production | |
MARTIN KLEPPMANN (LinkedIn) - Using logs to build a solid data infrastructure | |
CAITIE MCCAFFREY (Twitter) - Implementing the Saga Pattern | |
TAMMER SALEH (Pivotal) - Microservice AntiPatterns | |
PAUL BUTCHER (Ten Tenths Consulting, Pragmatic Programmers) - Concurrency: It's harder (and easier) than you think | |
JEREMY EDBERG (Netflix) - Building Reliable Distributed Data Systems | |
COREY HAINES (CoreyHaines) - Fun with the lambda calculus | |
DAVID NOLEN (Cognitect) - The Front End Architecture Revolution | |
MICHAEL NYGARD (Cognitect) - Architecture without an end state |
- Drift into Failure
- How Complex Systems Fail
- Antifragile: Things That Gain from Disorder
- Leverage Points: Places to Intervene in a System
- Going Solid: A Model of System Dynamics and Consequences for Patient Safety
- Resilience in Complex Adaptive Systems: Operating at the Edge of Failure
- Puppies! Now that I’ve got your attention, Complexity Theory
- [Towards Resilient Architectures: Biology
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Latency Comparison Numbers | |
-------------------------- | |
L1 cache reference 0.5 ns | |
Branch mispredict 5 ns | |
L2 cache reference 7 ns 14x L1 cache | |
Mutex lock/unlock 25 ns | |
Main memory reference 100 ns 20x L2 cache, 200x L1 cache | |
Compress 1K bytes with Zippy 3,000 ns 3 us | |
Send 1K bytes over 1 Gbps network 10,000 ns 10 us | |
Read 4K randomly from SSD* 150,000 ns 150 us ~1GB/sec SSD |
OlderNewer