Book picks similar to
100 Go Mistakes and How to Avoid Them by Teiva Harsanyi
go
golang
manning-unread
tech
The Mikado Method
Ola Ellnestam - 2014
The Mikado Method is a process for surfacing the dependencies in a codebase, so that you can systematically eliminate technical debt and get things done.It gets its name from a simple game commonly known as "pick-up sticks." You start with a jumbled pile of sticks. The goal is to remove the Mikado, or Emperor, stick without disturbing the others. Players carefully remove sticks one at a time, leaving the rest of the heap intact, slowly exposing the Mikado. The game is a great metaphor for eliminating technical debt—carefully extracting each intertwined dependency until you're able to successfully resolve the central issue and move on.The Mikado Method is a book by the creators of this process. It describes a pragmatic, straightforward, and empirical method to plan and perform non-trivial technical improvements on an existing software system. The method has simple rules, but the applicability is vast. As you read, you'll practice a step-by-step system for identifying the scope and nature of your technical debt, mapping the key dependencies, and determining the safest way to approach the "Mikado"-your goal. A natural byproduct of this process is the Mikado Graph, a minimalistic, relevant, just-in-time roadmap and information radiator that reflects deep understanding of how your system works.
C++ Pocket Reference
Kyle Loudon - 2003
This is especially true when it comes to object-oriented and template programming. The C++ Pocket Reference is a memory aid for C++ programmers, enabling them to quickly look up usage and syntax for unfamiliar and infrequently used aspects of the language. The book's small size makes it easy to carry about, ensuring that it will always be at-hand when needed. Programmers will also appreciate the book's brevity; as much information as possible has been crammed into its small pages.In the C++ Pocket Reference, you will find:Information on C++ types and type conversions Syntax for C++ statements and preprocessor directives Help declaring and defining classes, and managing inheritance Information on declarations, storage classes, arrays, pointers, strings, and expressions Refreshers on key concepts of C++ such as namespaces and scope More!C++ Pocket Reference is useful to Java and C programmers making the transition to C++, or who find themselves occasionally programming in C++. The three languages are often confusingly similar. This book enables programmers familiar with C or Java to quickly come up to speed on how a particular construct or concept is implemented in C++.Together with its companion STL Pocket Reference, the C++ Pocket Reference forms one of the most concise, easily-carried, quick-references to the C++ language available.
How To Destroy A Tech Startup In Three Easy Steps
Lawrence Krubner - 2017
When inexperienced entrepreneurs ask my advice about their idea for a tech startup, they often worry "What if Google decides to compete with us? They will crush us!" I respond that far more startups die of suicide than homicide. If you can avoid hurting yourself, then you are already better off than most of your competitors. Startups are a chance to build something entirely original with brilliant and ambitious people. But startups are also dangerous. Limited money means there is little room for mistakes. One bad decision can mean bankruptcy. The potential payoff attracts capital, which in turn attracts scam artists. The unscrupulous often lack the skills needed to succeed, but sometimes they are smart enough to trick investors. Even entrepreneurs who start with a strong moral compass can find that the threat of failure unmoors their ethics from their ambition. Emotions matter. We might hope that those in leadership positions possess strength and resilience, but vanity and fragile egos have sabotaged many of the businesses that I’ve worked with. Defeat is always a possibility, and not everyone finds healthy ways to deal with the stress. In this book I offer both advice and also warnings. I've seen certain self-destructive patterns play out again and again, so I wanted to document one of the most extreme cases that I've witnessed. In 2015 I worked for a startup that began with an ingenious idea: to use the software techniques known as Natural Language Processing to allow people to interact with databases by writing ordinary English sentences. This was a multi-billion dollar idea that could have transformed the way people gathered and used information. However, the venture had inexperienced leadership. They burned through their $1.3 million seed money. As their resources dwindled, their confidence transformed into doubt, which was aggravated by edicts from the Board Of Directors ordering sudden changes that effectively threw away weeks' worth of work. Every startup forces its participants into extreme positions, often regarding budget and deadlines. Often these situations are absurd to the point of parody. Therefore, there is considerable humor in this story. The collision of inexperience and desperation gives rise to moments that are simply silly. I tell this story in a day-to-day format, both to capture the early optimism, and then the later sense of panic. Here then, is a cautionary tale, a warning about tendencies that everyone joining a startup should be on guard against."
Electronic Instrumentation and Measurements
David A. Bell - 1983
Measurement methods and measurement precision are also covered.
The Tao of Network Security Monitoring: Beyond Intrusion Detection
Richard Bejtlich - 2004
This book reducesthe investigative workload of computer security incident response teams(CSIRT) by posturing organizations for incident response success.Firewalls can fail. Intrusion-detection systems can be bypassed. Networkmonitors can be overloaded. These are the alarming but true facts aboutnetwork security. In fact, too often, security administrators' tools can serve asgateways into the very networks they are defending.Now, a novel approach to network monitoring seeks to overcome theselimitations by providing dynamic information about the vulnerability of allparts of a network. Called network security monitoring (NSM), it draws on acombination of auditing, vulnerability assessment, intrusion detection andprevention, and incident response for the most comprehensive approach tonetwork security yet. By focusing on case studies and the application of opensourcetools, the author helps readers gain hands-on knowledge of how tobetter defend networks and how to mitigate damage from security incidents.
Reactive Microservices Architecture
Jonas Bonér - 2016
Specifically, you’ll learn how a Reactive microservice isolates everything (including failure), acts autonomously, does one thing well, owns state exclusively, embraces asynchronous message passing, and maintains mobility.Bonér also demonstrates how Reactive microservices communicate and collaborate with other services to solve problems. Get a copy of this exclusive report and find out how to bring your enterprise system into the 21st century.Jonas Bonér is Founder and CTO of Lightbend, inventor of the Akka project, co-author of the Reactive Manifesto and a Java Champion. Learn more at: http://jonasboner.com.
Higher-Order Perl: Transforming Programs with Programs
Mark Jason Dominus - 2005
However, Perl incorporates many features that have their roots in other languages such as Lisp. These advanced features are not well understood and are rarely used by most Perl programmers, but they are very powerful. They can automate tasks in everyday programming that are difficult to solve in any other way. One of the most powerful of these techniques is writing functions that manufacture or modify other functions. For example, instead of writing ten similar functions, a programmer can write a general pattern or framework that can then create the functions as needed according to the pattern. For several years Mark Jason Dominus has worked to apply functional programming techniques to Perl. Now Mark brings these flexible programming methods that he has successfully taught in numerous tutorials and training sessions to a wider audience.• Introduces powerful programming methods—new to most Perl programmers—that were previously the domain of computer scientists• Gradually builds up confidence by describing techniques of progressive sophistication• Shows how to improve everyday programs and includes numerous engaging code examples to illustrate the methods
Stack Silver Get Gold - How to Buy Gold and Silver Bullion without Getting Ripped Off!
Hunter Riley III - 2012
Its the only gold and silver investing book you will ever need because its written by a nationally recognized precious metals investing expert with almost 15 years of buying gold and silver bullion under his belt. He reveals all the tricks of the trade that most people in the gold and silver industry probably don't want you to know. "Stack Silver Get Gold will become "the bible" for both first time and long time precious metal investors. Tons of useful information and very well written. You have a real winner in this book." -Bill Zielinski (editor of goldandsilverblog.com) Stack Silver Get Gold: How to Buy Gold and Silver Bullion without Getting Ripped Off! Congratulations, you know that investing in gold and silver is a good idea and you're ready to buy gold and silver before the general public catches on. You have a wisdom few other people possess. So you want to know how to begin investing in silver and gold without getting ripped off? Do you want to buy silver and gold bullion but don't know where to begin? Do you want to avoid all the silver and gold buying scams on TV and the internet? Do you want to learn how to avoid having your gold and silver confiscated by the government? Do you want to know how and where to store and secure your gold and silver at your home, in the most secure vaults in the United States and secret vault storage options in other countries? You want to know how to start investing in gold and silver for as little as $25 using a strategy called dollar cost averaging? Do you want to buy gold or silver today, within 10 minutes of reading this short book? Read this book and you'll discover the answers to your questions above plus.... *The 7 types of gold and silver bullion to buy now and how to sell if you have t *The 11 types of gold and silver to avoid like the plague *The top 3 most secure places to store your precious metals, including home safes and private highly secure vaults *How to store your gold and silver secretly in another country *How the author is personally investing in gold and silver, his exact strategy *Exactly where to buy your gold and silver (the actual websites and dealers) *How to add gold and silver bullion to your IRA or 401k *How to start gold and silver investing safely and avoid all the tricks of scam artists and precious metals dealers *Tax and reporting requirements and even travel restrictions and how to get around them Stack Silver Get Gold was written by Hunter Riley III. Hunter spent most of his twenties on the futures trading floor of the rough and tumble pits in Chicago Mercantile Exchange and has been investing in silver and gold for more than a decade. He's witnessed all the ways the gold and silver bullion market will try to chew you up and spit you out and hew wrote this book so you can overcome them and be a successful gold and silver investor. His short, no fluff, straight to the point book boils down over a decade's worth of investing do's and don'ts into about 100 pages. You can literally read this book and start investing in gold and silver with total confidence, safety and ease on the same day you buy it. The funny thing is that this is probably the shortest book on gold and silver investing ever written but it's also is the only book you'll ever need to invest in gold and silver. Hunter values his time very much and he's written this book as straight to the point as possible because he knows you value your time as well. Some of those people who share your wise views are Jim Rogers, Michael Maloney, Robert Kiyosaki, Kevin Hogan, James Turk, Richard Duncan, Timothy Ferriss, Warren Buffet, Brendon Burchard, Kyle Bass, Peter Schiff and Marc Faber just to name a few. Go buy this book now. It will SAVE you a ton of money. Buy Stack Silver Get Gold: How to Buy Gold and Silver without Getting Ripped Off!
Remote: Office Not Required
David Heinemeier Hansson - 2013
Moms in particular will welcome this trend. A full 60% wish they had a flexible work option. But companies see advantages too in the way remote work increases their talent pool, reduces turnover, lessens their real estate footprint, and improves the ability to conduct business across multiple time zones, to name just a few advantages. In Remote, inconoclastic authors Fried and Hansson will convince readers that letting all or part of work teams function remotely is a great idea--and they're going to show precisely how a remote work setup can be accomplished.
Financial Management: Theory And Practice
Prasanna Chandra - 2005
sed and awk Pocket Reference: Text Processing with Regular Expressions
Arnold Robbins - 2000
sed, awk, and regular expressions allow programmers and system administrators to automate editing tasks that need to be performed on one or more files, to simplify the task of performing the same edits on multiple files, and to write conversion programs.The sed & awk Pocket Reference is a companion volume to sed & awk, Second Edition, Unix in a Nutshell, Third Edition, and Effective awk Programming, Third Edition. This new edition has expanded coverage of gawk (GNU awk), and includes sections on:An overview of sed and awk's command line syntaxAlphabetical summaries of commands, including nawk and gawkProfiling with pgawkCoprocesses and sockets with gawkInternationalization with gawkA listing of resources for sed and awk usersThis small book is a handy reference guide to the information presented in the larger volumes. It presents a concise summary of regular expressions and pattern matching, and summaries of sed and awk.Arnold Robbins, an Atlanta native now happily living in Israel, is a professional programmer and technical author and coauthor of various O'Reilly Unix titles. He has been working with Unix systems since 1980, and currently maintains gawk and its documentation.
Patterns Principles and Practices of Domain Driven Design
Scott Millett - 2014
A focus is placed on the principles and practices of decomposing a complex problem space as well as the implementation patterns and best practices for shaping a maintainable solution space.
.Net Microservices: Architecture for Containerized .Net Applications
César de la Torre - 2017
It discusses architectural design and implementation approaches using .NET Core and Docker containers. To make it easier to get started with containers and microservices, the guide focuses on a reference containerized and microservice-based application that you can explore. The sample application is available at the eShopOnContainers GitHub repo.
Implementing Domain-Driven Design
Vaughn Vernon - 2013
Vaughn Vernon couples guided approaches to implementation with modern architectures, highlighting the importance and value of focusing on the business domain while balancing technical considerations.Building on Eric Evans’ seminal book, Domain-Driven Design, the author presents practical DDD techniques through examples from familiar domains. Each principle is backed up by realistic Java examples–all applicable to C# developers–and all content is tied together by a single case study: the delivery of a large-scale Scrum-based SaaS system for a multitenant environment.The author takes you far beyond “DDD-lite” approaches that embrace DDD solely as a technical toolset, and shows you how to fully leverage DDD’s “strategic design patterns” using Bounded Context, Context Maps, and the Ubiquitous Language. Using these techniques and examples, you can reduce time to market and improve quality, as you build software that is more flexible, more scalable, and more tightly aligned to business goals.
Build Your Own Database Driven Website Using PHP & MySQL
Kevin Yank - 2001
There has been a marked increase in the adoption of PHP, most notably in the beginning to intermediate levels. PHP now boasts over 30% of the server side scripting market (Source: php.weblogs.com).The previous edition sold over 17,000 copies exclusively through Sitepoint.com alone. With the release of PHP 5, SitePoint have updated this bestseller to reflect best practice web development using PHP 5 and MySQL 4.The 3rd Edition includes more code examples and also a new bonus chapter on structured PHP Programming which introduces techniques for organizing real world PHP applications to avoid code duplication and ensure code is manageable and maintainable. The chapter introduces features like include files, user-defined function libraries and constants, which are combined to produce a fully functional access control system suitable for use on any PHP Website.