Categories
Computing SysAdmin Technology Web

April 2017 Browser Tab Round-Up

Development
https://store.digg.com/sales/xamarin-bundle-cross-platform-development?utm_source=digg.com&utm_medium=referral&utm_campaign=xamarin-bundle-cross-platform-development_012117&utm_term=scsf-213321
https://store.digg.com/sales/the-python-power-coder-bonus-bundle?utm_source=digg.com&utm_medium=referral&utm_campaign=the-python-power-coder-bonus-bundle_012117&utm_term=scsf-213318
https://code.visualstudio.com/

Literature
http://lifehacker.com/the-20-best-books-of-2016-according-to-36-best-of-li-1790560969

Infrastructure
https://hyper.is/
https://envoyer.io/
https://serversforhackers.com/
https://forge.laravel.com/features
https://quickadminpanel.com
https://spark.laravel.com/

Reducing latency spikes by tuning the CPU scheduler


https://medium.freecodecamp.com/how-we-fine-tuned-haproxy-to-achieve-2-000-000-concurrent-ssl-connections-d017e61a4d27
https://github.com/fardog/secureoperator
https://developers.google.com/speed/public-dns/docs/dns-over-https
https://dns.google.com/query?name=google.com&type=A&dnssec=true

GoTTY – Share Your Linux Terminal (TTY) as a Web Application


New Draft NIST standards for password management

“Verifiers SHOULD NOT impose other composition rules (e.g., mixtures of different character types) on memorized secrets. Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically) and SHOULD only require a change if the subscriber requests a change or there is evidence of compromise of the authenticator.”

https://pages.nist.gov/800-63-3/sp800-63b.html

Leave a Reply