Linux cluster sysadmin -- SSH keys
A guide to using SSH keys for password-less authentication and management across a Linux cluster, enabling tools like PDSH and colmux.
A guide to using SSH keys for password-less authentication and management across a Linux cluster, enabling tools like PDSH and colmux.
A guide to using PDSH for executing commands in parallel across a Linux cluster, covering setup and practical examples.
A blogger shares their personal recommendations for the best Python IDEs, including Sublime Text and PyCharm, based on their experience.
A TechEd presenter shares analytics and configuration details from an Azure API Management competition, including usage metrics and rate-limiting policies.
A guide to pushing logs directly to AWS CloudWatch using the AWS CLI plugin, eliminating the need for a daemon or intermediate files.
Critique of outdated government software procurement practices and the need to adopt modern version control and delivery methods.
Explains why simply releasing government source code isn't true open source, which requires licensing, community, and collaboration.
A collection of practical programming wisdom covering code design, testing, dependencies, and development processes for better software engineering.
A guide on using tcpdump to capture network traffic and sending the logs to AWS CloudWatch for debugging Apache server issues.
A guest post in a series exploring methods and best practices for tracking document versions within MongoDB databases.
Analysis of JavaScript parse and execution times for jQuery across various browsers and devices, using a profiling tool released by Etsy.
Explains AWS authentication options like root accounts and IAM users, focusing on security best practices and access control.
Explains how to use PowerShell splatting to improve code readability and reduce duplication when calling cmdlets with many parameters.
A CTO's perspective on Microsoft's vNEXT platform, analyzing its impact on development approaches and future .NET frameworks.
Debunks the myth that open source software is inherently insecure, comparing it to proprietary alternatives and explaining its security advantages.
A guide to fixing Windows domain trust relationship issues using PowerShell without requiring a system reboot.
Analysis of .NET vNext's BYOT (Bring Your Own Tool) approach, enabling development on non-Windows platforms like Mac and Ubuntu.
A guide to the challenges and best practices of micro and nano-benchmarking in software development, using .NET examples.
Explores JavaScript monkey patching, a powerful but dangerous technique for modifying objects and classes, with warnings and practical examples.
A developer critiques Responsive Web Design (RWD), arguing for device detection as a complementary approach to improve performance and user experience.