Ever since I defended my thesis in September 2012, a thought had been left lingering in the epilogue of my book: that computing systems architects and designers are currently incentivized by market effects to build mostly “closed” systems that are annoying to tinker with. Besides a few exceptions like Raspberry …| dr knz @ work
The table Also available in PDF form. The online test A web application is available to assess your own skills according to this table for one or more programming languages. How to use this table The table characterizes the proficiency level (columns) of programmers of a particular programming language in …| dr knz @ work
Upon our arrival in New Orleans on November 5th, 2018, my friend Nathan explained to me, with a mix of apparent excitement and apprehension: “our internal Jepsen test suite found a real consistency bug.” I replied: “This is great! This confirms yet again that good testing is actually useful! Have …| dr knz @ work
I like to think about computer security as the science of how things can go wrong with computers. There is so much that can go wrong! In so many different ways! To avoid becoming overwhelmed, computer engineers need a systematic way to think about security, talk about it with each …| dr knz @ work
This article explains how I stopped a software vendor and at least one of its customers from hemorraging $50K+ yearly due to unnecessary costs. ❦❦❦ A recommended best practice in Enterprise security is the “three R’s”: Repair, Repave and Rotate [1] [2] [3]. Repair means applying security patches as soon …| dr knz @ work