How To Keep Your Best Programmers | DaedTech

June 8th, 2013
Interesting post [but too long to my taste] about what motivates software developers and how it affects their career choices. ( see also this RSA Animation http://www.youtube.com/watch?v=u6XAPnuFjJc )

How Phone Number Porting Works

June 7th, 2013
In short: when phone call is made, phone switch checks a database to see if the called number has a secondary phone number (caller LNR), if yes, that number is used to route the call. LNP = Local Number Portability NPAC = Number portability administration center. LNR = Location Routing Number

How Phone Number Porting Works

June 7th, 2013
In short: when phone call is made, phone switch checks a database to see if the called number has a secondary phone number (caller LNR), if yes, that number is used to route the call. LNP = Local Number Portability NPAC = Number portability administration center. LNR = Location Routing Number

[rsyslog] rsyslog (v 5.8.3) multi-line message support

June 7th, 2013
example for centralize logging setup with rsyslog, taken from mailing list discussion

[rsyslog] rsyslog (v 5.8.3) multi-line message support

June 7th, 2013
example for centralize logging setup with rsyslog, taken from mailing list discussion

Centos L2TP Client to Mikrotik L2TP-Server | xxxl.co.za

June 2nd, 2013
How to create dynamic VPN tunnel between a linux server and Mikrotik device. This is suitable if you want to create a tunnel between an EC2 instance and small office NOTE: Example does not provide encryption.

Centos L2TP Client to Mikrotik L2TP-Server | xxxl.co.za

June 2nd, 2013
How to create dynamic VPN tunnel between a linux server and Mikrotik device. This is suitable if you want to create a tunnel between an EC2 instance and small office NOTE: Example does not provide encryption.

The Architecture of Open Source Applications

June 2nd, 2013
so called AOSA book. " Architects look at thousands of buildings during their training, and study critiques of those buildings written by masters. In contrast, most software developers only ever get to know a handful of large programs well—usually programs they wrote themselves—and never study the great programs of history. As a result, they repeat one another's mistakes rather than building on one another's successes. Our goal is to change that. In these two books, the authors of four dozen open source applications explain how their software is structured, and why. What are each program's major components? How do they interact? And what did their builders learn during their development? In answering these questions, the contributors to these books provide unique insights into how they think."

The Architecture of Open Source Applications

June 2nd, 2013
so called AOSA book. " Architects look at thousands of buildings during their training, and study critiques of those buildings written by masters. In contrast, most software developers only ever get to know a handful of large programs well—usually programs they wrote themselves—and never study the great programs of history. As a result, they repeat one another's mistakes rather than building on one another's successes. Our goal is to change that. In these two books, the authors of four dozen open source applications explain how their software is structured, and why. What are each program's major components? How do they interact? And what did their builders learn during their development? In answering these questions, the contributors to these books provide unique insights into how they think."

Assessing Technical Risks for Startups – New Tech Leader Series | kate{mats}

June 2nd, 2013
Good check list from Kate Matsudaira.