Blog

The 44-Year-Old Operating System Bug

The 44-Year-Old Operating System Bug This month computer enthusiast Foone Turing stumbled across what he describes as a bug that’s survived for over 44 years — one that left him with a file that was impossible to copy. When this was developed, nothing had UPC codes yet because they’d just been…
Read more

0-0x Realistic AI Options For NodeJS Developers

Realistic AI Options For NodeJS Developers Everyone wants to use artificial intelligence and machine learning (AI/ML), but none of us are quite sure where to start. These new technologies are exciting, but most people don’t have the time to become a data scientist, and nobody really wants to learn a…
Read more

0-0x Design for Performance

Design for Performance This presentation is a “lessons learned” summary of some 20 years of experience designing, developing, and maintaining a large-scale commercial software system for the users who are primarily interested in performance. Competitive benchmarks are the dominant factor in our users’ decisions whose tool to buy. A high-quality…
Read more

This Week in Programming: Success at the Fault of Exceptions

This Week in Programming: Success at the Fault of Exceptions This one day, back in the early 2000s, is still burnt into my memory as an exemplification of all that is programming. Everything I was working toward had ground to a halt because of some unspecified error. Whatever weird CMS…
Read more

0-0x Variable Fonts and Dynamic Typography with CSS

Variable Fonts and Dynamic Typography with CSS Newer developments in CSS make it easier than ever to create robust, scalable, elegant typographic systems on the web and in apps. But the fun really starts when you add variable fonts. The design, technical, and performance benefits are really exciting—but when you…
Read more

PHP Integers, Floats and Number Strings

PHP Integers, Floats and Number Strings Working with numbers in PHP seems to be a trivial concept but it can be quite confusing. It looks easy at first because PHP provides automatic type conversion. For example, you can assign an integer value to a variable and the type of that…
Read more

File Upload With Multer in Node.js and Express

File Upload With Multer in Node.js and Express When a web client uploads a file to a server, it is generally submitted through a form and encoded as multipart/form-data. Multer is middleware for Express and Node.js that makes it easy to handle this multipart/form-data when your users upload files. In this tutorial, I’ll…
Read more

0-0x React360: 2D to 3D

React360: 2D to 3D WebVR enables web developers to create frictionless, immersive experiences. We’ll explore the core concepts behind VR, see different demonstrations, learn how to get started with Three.js and React360 to create 3D experiences both for web and VR. EVENT: ReactiveConf 2018 SPEAKER: Shay Keinan PERMISSIONS: Reactive Conference…
Read more

TNS Context: Semaphore 2.0 and VMware Buys Heptio

TNS Context: Semaphore 2.0 and VMware Buys Heptio Welcome to The New Stack Context podcast where today we will be discussing the release of the Semaphore 2.0 tool for continuous delivery on Kubernetes. We’ll also be discussing yet another hot acquisition — this time it’s VMware announcing plans to acquire…
Read more

0-0x 20 Years of Product Management in 25 Minutes

20 Years of Product Management in 25 Minutes Dave Wascha started as a product manager 20 years ago working on Internet Explorer 4.0. Since then he’s had his share of successes and failures in a storied career spanning the US and Europe, and in this entertaining and insightful talk from…
Read more

Kaniko Builds Container Images without the Docker Daemon

Kaniko Builds Container Images without the Docker Daemon Google has recently introduced Kaniko, an open-source tool for building container images from a Dockerfile even without privileged root access. If you’ve noticed, Docker daemon always runs as the root user. It actually binds to a Unix socket instead of a TCP port. By default,…
Read more

Autonomous Modular Robot Self-Transforms to Bypass Obstacles

Autonomous Modular Robot Self-Transforms to Bypass Obstacles Whether they are designed to perform jaw-dropping stunts or precision surgery, we are seeing now that robots can come in all shapes and sizes — and can even be made to transform themselves in order to adapt to the situation at hand. The idea…
Read more

Securing Ubuntu 18 04 with Apparmor

Securing Ubuntu 18 04 with Apparmor Mandatory Access Control systems like SELinux or Apparmor go way beyond Linux permissions which are discretionary and can be ignored by root. Application on your system such a ping run with the SUID bit as root. We want to limit their access to the…
Read more

Build Machine Learning Models with IBM Watson Studio Cloud

Build Machine Learning Models with IBM Watson Studio Cloud This article is a part of the series where we explore cloud-based machine learning services. After covering Azure ML Services, Google Cloud ML Engine, and Amazon SageMaker, we will take a closer look at IBM Watson Studio Cloud. IBM has consolidated…
Read more

Build Machine Learning Models with IBM Watson Studio Cloud

Build Machine Learning Models with IBM Watson Studio Cloud This article is a part of the series where we explore cloud-based machine learning services. After covering Azure ML Services, Google Cloud ML Engine, and Amazon SageMaker, we will take a closer look at IBM Watson Studio Cloud. IBM has consolidated…
Read more

PHP Exceptions: Try Catch for Error Handling

PHP Exceptions: Try Catch for Error Handling In this post, you’ll learn how to use exception handling in PHP. As of PHP 5, we can use try catch blocks for error handling—this is a better way to handle exceptions and control the flow of your application. In this article, we’ll…
Read more

Red Hat-IBM Acquisition: Clash of Cultures or Best of Both Worlds?

Red Hat-IBM Acquisition: Clash of Cultures or Best of Both Worlds? Red Hat’s acquisition by IBM has been the biggest story of the year, dwarfing Microsoft’s acquisition of GitHub. But the acquisition has been notable for many reasons, one of them is that this is the third largest IT acquisition…
Read more

Poorly Configured CI/CD Systems Can Be a Backdoor into Your Infrastructure

Poorly Configured CI/CD Systems Can Be a Backdoor into Your Infrastructure CloudBees sponsored this story, as part of an ongoing series on “Cloud Native DevOps.” Check back through the month on further editions. Continuous integration and delivery (CI/CD) processes are a common component of modern software development. Since most of…
Read more

0-0x A Strory of a Generator

A Strory of a Generator A fun story of writing a generator with a brief interlude into dunder methods, itertools pitfalls, and the Python garbage collector. EVENT: PyCon Australia 2018 PERMISSIONS: Original video was published with the Creative Commons Attribution license (reuse allowed). View on YouTube

Smart Workloads: The Bridge to Self-Managing Systems

Smart Workloads: The Bridge to Self-Managing Systems Eva Tuczai Eva has more than 15 years of experience in IT Service Management, spanning Application Performance Management, Virtualization Optimization, and Enterprise Grade Continuous Quality in Mobile Application Strategies. As part of Turbonomic’s Advanced Engineering team, she is committed to bringing a customer-centric…
Read more