- The Validity and Utility of Selection Methods in Personnel Psychology
- Instrument Validity and Reliability
- Hiring is Broken
- Developer Interviews Are Broken and You Can't Fix It
- Companies Who Give Candidates Homework Assignments: Knock it Off
- Personnel Selection (Wikipedia)
- Startup Interviewing is Fucked
- We only hire the trendiest
- [Why We're Bad at H
This is a copy/paste from an internal wiki on how we should use docker
This guide is to serve as an outline of internal best practices to using Docker. The idea is to give enough information to allow engineers to create containers for new stack components while minimizing the cleanup required to make them production ready.
Before we get to the practices, it's important to understand WHY we are doing this. The key concepts we're concerned about with broad Docker usage are provenance, determinism, repeatability and auditability.
Provenance refers to knowing WHERE something comes from. Generally with the end use of software, this is easy:
- Maven artifacts are pulled from central
This template is supposed to be applied to rails 5.
run with:
rails new <application_name> --template=https://gist.githubusercontent.com/karloku/edd6a158e275fdefa334/raw/b56175bee5b45d32310aeb620e23be44e3c2a56d/graphql_template.rb -T
using gems:
- graphql
- graphql-mutable_type
SELECT | |
ARMOR(PGP_PUB_ENCRYPT( | |
'Hello, World', | |
DEARMOR('-----BEGIN PGP PUBLIC KEY BLOCK----- | |
Version: GnuPG v2 | |
mQINBFPRvdYBEACeM7pbpqxheVpIkfNSt1I//MLMmmvV/2XlJFj0z4zTOZPU5KTl | |
DNpfV0bHSUU5pOs9hSkM5WP+uWTAl/X5a5Ty7Vdr0r//sYNYt05ummAZQEwfaSzj | |
Ys57Ks1yC/31SOM/bOvWOIf/+D/GVAEuJTdfwic/Vv56ixuk8skLjWTmxBBCFpbF | |
dEXWyxuADvftrhaGq16xaOx0vLFxagL7mpIEjVN2yYadR5iMm1g48lAG6Tc/JEPY |
No, seriously, don't. You're probably reading this because you've asked what VPN service to use, and this is the answer.
Note: The content in this post does not apply to using VPN for their intended purpose; that is, as a virtual private (internal) network. It only applies to using it as a glorified proxy, which is what every third-party "VPN provider" does.
- A Russian translation of this article can be found here, contributed by Timur Demin.
- A Turkish translation can be found here, contributed by agyild.
- There's also this article about VPN services, which is honestly better written (and has more cat pictures!) than my article.
##################################### | |
# 0. SET UP AWS (ASSUMING YOU HAVE ALREADY SET UP AN ACCOUNT) | |
# CREATE SECURITY GROUP | |
• In the EC2 Dashboard, click Security Groups, then Create Security Group. | |
• Enter Name | |
• Enter Description | |
• Rules to add: | |
- HTTP | |
- SSH |
#!/usr/bin/env bash | |
# A basic Self Signed SSL Certificate utility | |
# by Andrea Giammarchi @WebReflection | |
# https://www.webreflection.co.uk/blog/2015/08/08/bringing-ssl-to-your-private-network | |
# # to make it executable and use it | |
# $ chmod +x certificate | |
# $ ./certificate # to read the how-to |
Each version of the API should remain functional for a period of time after the next version is released to allow client applications time to migrate to the next version. Typically this is done by placing a version number in a query parameter ?version=20151201
. If no version is provided, the latest API version will be assumed.
https://company.com/api/