Last week I told you about my training experience at Black Hat 2015. Now it is time to talk to you about the briefings and the business hall.
I stumbled over this document dating back to World War 2 where the predecessor to CIA, the Office for Strategic Services issued a field manual on how to sabotage. Especially interesting are the sections on general interference with organizations and production.
The microservice hype where every application that uses a service should be implemented as a series of microservices is a little unhealthy. Like most technologies; if you don't know what you are getting yourself into there will be problems...
Testing things where you need to fake time is not hard given the right abstractions. That is why when I read this article I felt really sad. Because while the article describes one way to fake time it does so by breaking three fundamentals which is pretty hard in three lines of relevant code...
Almost 2 years ago I wrote about this problem with accessing data from Azure and returning it in a LINQ friendly way. Well not long ago the discussion came up again only this time it was in regard to access data in a Cassandra cluster.