“The problem with these tests is twofold. First, parents are testing their children in ways that could have serious implications as they grow older — and they are not old enough to consent. Second, by sharing their children’s genetic information on public websites, parents are forever exposing their personal health data.”
If you’ve ever wondered how Change Data Capture might be implemented, this is an excellent blog post by the Netflix Engineering team that explains how they’ve implemented DBLog, an open source CDC tool.
I particularly like the use of the low and high watermarks to ensure the contents of a dump don’t overwrite more up to date entries from the transaction log.
The headline says Google today but until corporates are heels accountable for something other than profit these stories will continue. It’s difficult to see where this accountability will come from.
> “Is it the inevitable outcome of a corporate culture that rewards growth and profits over social impact and responsibility?”
“Ten years of social media have left us all worse off.” – ft.com
There is so much more that could be said about the way we’ve allowed social media to shape the last decade; speed over accuracy, the role of the algorithmic feed, the amplification of minority views, the lack of accountability, the abuse...
The more I read about these large scale security breaches, the more I think security is an underrated field of work. Too often the real challenges are lost in efforts to guarantee security through poorly fitting checklists and process.
https://www.wsj.com/articles/ghosts-in-the-clouds-inside-chinas-major-corporate-hack-11577729061 Ghosts in the Clouds: Inside China's Major Corporate Hack - Wall Street Journal
Server-Timing Client-Side: Augment the DevTools network timing charts with server-side timing information.
> "A lack of awareness of security seems to lead to a lack of prioritization of tasks that don’t directly support bringing the product to launch. The market seems to have made it more important to launch a usable product than a secure one, with the prevailing attitude being, “we can do the security stuff later.”
What do Facebook, China and Apple have in common? It’s not technology…
They’ve all been the subject of discussion on an incredible run of episodes on The Exponent podcast by Ben Thompson and James Allworth. Highly recommend.
If you are on the journey to micro-services, you could do worse than put some thought into understanding dependencies between your system components.
All too often it’s the pager that alerts teams to the increased complexity and fragility of managing inter-service dependencies at runtime.
The mysterious case of macOS Terminal ignoring folders in the PATH variable. Or how the Catalina upgrade broke copy/paste in Vim.
Yep, @1Password@twitter.com sold out.
So now they have to make several billion dollars and exit (get sold or IPO). How are they going to do that? And who’s going to buy them? Google, Facebook, IBM, Palantir…? https://twitter.com/__debo/status/1195139286926012418
For all the talk of “lawyers should learn to code”, perhaps we can focus on even a high-level understanding of how some core tech works first?
(Says me, grumpily, after abandoning an article on legal issues in DNS as neither the authors nor reviewers seem to understand DNS.)
HTTP Archive's annual state of the web report is out. I’ve not been able to read it all but love the factual, non-alarmist tone. Stand out chapter for me has been the insight into 3rd Party. Key take away being that the reach of the web giants is invisible to the majority of web users.