10 July 2020

Knowledge Pyramid

We need to understand the breadth and depth of this pyramid to become a good Architect.

The more dangerous part is the bottom: "stuff you don't know you don't know."


I am taking this idea from Neal & Mark.


http://nealford.com/memeagora/2015/09/08/knowledge-breadth-versus-depth.html

02 June 2020

Math for Programmers


Technical reviewed:

Paul Orland
MEAP began December 2018  Publication in Fall 2020 (estimated)
ISBN 9781617295355  650 pages (estimated)  printed in black & white

https://www.manning.com/books/math-for-programmers


Spring Security in Action

Technical reviewed:

Laurentiu Spilca
MEAP began December 2019  Publication in Early 2021 (estimated)

ISBN 9781617297731  550 pages (estimated)


https://www.manning.com/books/spring-security-in-action



Language Fashion

Python --> Math
Typescript --> OOP
Java --> Enterprise/Microservice
Javascript --> Frontend

22 May 2020

Ludic Computer Science Books

Among the years, I have seen several books that provide sharp academic knowledge in a ludic way.

 This is a list I gather together :

  • TAOCP 4 (has some of it because of handle puzzles).

https://devwebcl.blogspot.com/2015/10/books-for-programming-challenges-puzzles.html

https://devwebcl.blogspot.com/2018/12/musician-books-entities.html


16 May 2020

Memoization Notes


  • Memoization... las funciones de verdad que siempre tendran el mismo output... entonces podemos guardarelas para no recalcularlas.
  • Fibonacci is a good example
  • We need to identify/create the function that can be memoization... and if we are lucky, then we can have a functional function :P that can have memoization.
  • Books on Memoization?
  • Do thinking! (correct thinking!)
  • Combinatorial optimization
  • Linear programming
  • Dynamic programming


24 April 2020

Bastion Hosts on AWS

A bastion host is a server whose purpose is to provide access to a private network from an external network, such as the Internet. Because of its exposure to potential attack, a bastion host must minimize the chances of penetration. For example, you can use a bastion host to mitigate the risk of allowing SSH connections from an external network to the Linux instances launched in a private subnet of your Amazon Virtual Private Cloud (VPC).



https://aws.amazon.com/blogs/security/how-to-record-ssh-sessions-established-through-a-bastion-host/

https://aws.amazon.com/quickstart/architecture/linux-bastion/


23 April 2020

My Blog List

Blog Archive

Disclaimer

The views expressed on this blog are my own and do not necessarily reflect the views of Oracle.