Remove can-we-make-databases-invisible
article thumbnail

How to tame your Python codebase

Xebia

Now that you know your boundaries, you have to make sure the boundaries are respected. Point 1 you most likely cannot learn from a blog post, but point 2 is definitively something we can tackle here. It tries to help you with the question: How can I codify the boundaries by which I develop and extend my application?

How To 130
article thumbnail

Measurement: What SaaS platform builders need to know to prepare for growth, Part 3

CloudGeometry

We begin by taking stock of three foundational dimensions: (1) User Model , (2) Monetization , and (3) Measurement. In this blog series, we explore how these three dimensions figure into key technical recommendations which enable scale in pursuit of SaaS business growth. It makes no difference to anyone but you.

Metrics 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bjorn Freeman-Benson: Three Challenges of Distributed Teams

James Shore

James Shore/Blog. Highlights of his career include heading up engineering at New Relic as it grew from 3 developers to 330; growing Invision from 60 developers to 350 as its CTO; working on VisualAge Smalltalk at OTI (Object Technology International); and coordinating the open-source Eclipse developers at the Eclipse Organization.

article thumbnail

Bjorn Freeman-Benson: Three Challenges of Distributed Teams

James Shore

James Shore/Blog. Highlights of his career include heading up engineering at New Relic as it grew from 3 developers to 330; growing Invision from 60 developers to 350 as its CTO; working on VisualAge Smalltalk at OTI (Object Technology International); and coordinating the open-source Eclipse developers at the Eclipse Organization.

article thumbnail

10 Reasons to Consider Cloud Cost Optimization Service

Mobilunity

We’ll talk about cloud cost optimization and why it’s so relevant in this article. Thorough cloud cost optimization strategies make it simple to spot flaws and manage resources as effectively as possible. If you are in search of truly effective cloud cost optimization services, we know how to help. Contact us.

Cloud 52
article thumbnail

Using Graph Processing for Kafka Stream Visualizations

Confluent

We know that Apache Kafka ® is great when you’re dealing with streams, allowing you to conveniently look at streams as tables. For example, in a social network, understanding the network means we need to look at the friend relationships between people. But what about when the relationships between items dominate your application?

Social 55
article thumbnail

Attention security researchers! Submit your new 2009 Web Hacking Techniques

Jeremiah Grossman

Every year Web security community produces dozens of new hacking techniques documented in white papers, blog posts, magazine articles, mailing list emails, etc. We are not talking about individual vulnerability instances with CVE numbers, nor intrusions / incidents, but the actual new methods of Web attack. and RSA USA 2010 (Mar.)