Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT

Links 1 through 10 of 10441 Robert Lehmann's Bookmarks

Kong is a scalable, open source API Layer (also known as an API Gateway, or API Middleware). Kong runs in front of any RESTful API and is extended through Plugins, which provide extra functionalities and services beyond the core platform.

Kong was originally built at Mashape to secure, manage and extend over 15,000 APIs & Microservices for its API Marketplace, which generates billions of requests per month for over 200,000 developers. Today Kong is used in mission critical deployments at small and large organizations.

Share It With Others!

Brexit. You never thought this could actually happen but here we are. So here's the thing: if you don't fancy the idea of being stuck on an island with Boris & Nigel for the rest of your life, we might have a plan.

Share It With Others!

Proper Mug Utilization For the Home and Work Place

Share It With Others!

Enable the most advanced web innovations with the Crosswalk Project web runtime to develop powerful Android and Cordova apps.

Share It With Others!

Ninja development team? New developers on board? Don't spend your valuable time on DevOps. Be productive from the first hour. Your team focuses on writing quality code and Platform.sh provides you with a full-stack environment for every Git branch you create, which means faster onboarding of team members, easy testing and demos, lots of practice with deployments, and more people able to work in parallel.

Share It With Others!

Pseudo-3D shooter written completely in awk using raycasting technique. Bring some old-school fun to your terminal! Explore the dungeon and shoot monsters in this pseudo-3D game inspired by the classic Wolfenstein 3D and Doom.

Share It With Others!

It started with an offhand remark from a friend as she grimaced at her phone: “What a novel.” She gestured to the Facebook message filling her screen. The message in question was polite and standard: a salutation, a reference to how they met, a socially-savvy balance of interest and casual. There was nothing that should have sparked such displeasure. What was happening here?

Share It With Others!

Recently Xen has released the XSA-148 advisory addressing a fatal bug in the hypervisor. The bug has been lurking there for the last 7 years! We, the Qubes OS Project, have commented on this in our Security Bulletin #22. And far from enthusiastic commentary that was (FWIW, it was me who wrote this QSB, as evidenced in the commits log, in case some from the Xen community would like to direct their rage towards a particular human being ;) Ian Jackson then wrote a response on the Xen blog. I was then asked to share some more thoughts about how I thought Xen could actually improve its security process. So, I share some these below.

Share It With Others!

Like many of you, I have been entertained by the unstoppable clown car that is Donald Trump. On the surface, and several layers deep as well, Trump appears to be a narcissistic blow-hard with inadequate credentials to lead a country. The only problem with my analysis is that there is an eerie consistency to his success so far. Is there a method to it? Is there some sort of system at work under the hood? Probably yes. Allow me to describe some of the hypnosis and persuasion methods Mr. Trump has employed on you. (Most of you know I am a trained hypnotist and this topic is a hobby of mine.)

Share It With Others!

Our destination was a sliver of land in the far north of Syria: Rojava, or ‘‘land where the sun sets.’’ The regime of President Bashar al-Assad doesn’t officially recognize Rojava’s autonomous status, nor does the United Nations or NATO — it is, in this way, just as illicit as the Islamic State. But if the reports I heard from the region were to be believed, within its borders the rules of the neighboring ISIS caliphate had been inverted. In accordance with a philosophy laid out by a leftist revolutionary named Abdullah Ocalan, Rojavan women had been championed as leaders, defense of the environment enshrined in law and radical direct democracy enacted in the streets.

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT