An interesting talk by GitHubber Zach Holman on code, teams and process – “move fast & break nothing“. It covers everything from DO’s and DONT’s, tools, and even Blue Angels jet fighter flying squad. (Check the link above for slides and transcript, if video is not your thing).
I’ve implemented a very simple feature control mechanism before, but nothing to the sounds of this one. Rolling out to groups of users, conditional control, geo-tagging, and more. On top of it, non-technical users seem to be able to use for tuning the groups. This sounds quite impressive, especially when you think of the Instagram’s user base (400,000,000+ users).
How Complex Systems Fail – a very concise, yet complete paper on how complex systems fail. It’s not system or industry specific. Here are just the bullet points:
Complex systems are intrinsically hazardous systems.
Complex systems are heavily and successfully defended against failure.
Catastrophe requires multiple failures – single point failures are not enough…
Complex systems contain changing mixtures of failures latent within them.
Complex systems run in degraded mode.
Catastrophe is always just around the corner.
Post-accident attribution accident to a ‘root cause’ is fundamentally wrong.
Hindsight biases post-accident assessments of human performance.
Human operators have dual roles: as producers & as defenders against failure.
All practitioner actions are gambles.
Actions at the sharp end resolve all ambiguity.
Human practitioners are the adaptable element of complex systems.
Human expertise in complex systems is constantly changing.
Change introduces new forms of failure.
Views of ’cause’ limit the effectiveness of defenses against future events.
Safety is a characteristic of systems and not of their components.
People continuously create safety.
Failure free operations require experience with failure.
I’m throwing this into the pile of arguments for “security and privacy are little but myths” discussions. If top of the top companies, with multi-million budgets and hundreds or thousands of top security professionals get compromised, how realistic is it for the average Joe to protect his business? I say – not very.
I think 80% of problems can be prevented with the 20% time and effort investment: minimize attack surface by removing and disabling everything you don’t need or use and limiting access to everything else, use layered defense where possible, use encryption where possible and strong passwords if you have to, don’t rely on security through obscurity, have log analyzers and/or intrusion detection system installed, etc. But most importantly, make peace with the fact that being compromised is not the question of “if”, but “when”. Prepare yourself. Have an offsite backup and know how to restore your services in a completely new environment, if necessary.
And as far as your privacy goes, if you put anything private on the Internet, as well, prepare for it to be stolen and leaked. If it never happens, consider yourself lucky. Otherwise, just learn to deal with it. It’s very unpleasant in a variety of ways, but seldom deadly.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.