Cross-reading #9

Written on

The Mythology of Red Bull (twitter.com/mariodgabriele)

Red Bull is a weird and fascinating company.

– $7.4 billion in 2020 revenue – 43% energy drink market – Makes nothing.

Nope, not even the drinks they sell. Instead, they focus 100% on marketing.

Shit User Story (twitter.com/shituserstory)

As a…

– Siri user setting my alarm I want to… – be told that there are no matches found for “alarm for 7am” on Apple Music So that… – I can manually set my alarm for 7am via the clock app

Writing HTML in HTML (john.ankarstrom.se)

In summary, I don’t think this post will convince everyone – and it’s not written for everyone. It’s written for those who have found themselves in the same situation as me: regularly rewriting their website, fighting with their static site generator. For these people, I think pure HTML is the best choice.

Breaking GitHub Private Pages for $35k (robertchen.cc)

Abusing CRLF1, cache poisoning, and other misconfigurations for a no-interaction XSS2 against GitHub Private Pages.

facebookbreach.com (facebookbreach.com)

Facebook had a vulnerability that enabled malicious actors to upload large sets of phone numbers to see which ones matched Facebook users. This was exploited to create a massive database containing the mobile phone numbers (and associated Facebook personal data) of 533 million users across the world. This data was sold at a high price in small circles up until a few days ago, where it was shared publicly for free.

How to Learn Complex Things Quickly: A Guide (product.hubspot.com)

Learning is an iterative process. Start by defining your goals, and break them down into bite-sized chunks. Get some context by reading whatever docs are available, but don’t try to digest them in one bite. Don’t be scared to try to get more information out of the system. Ask for help when you’ve exhausted your budget, but be very clear about what you’re asking. Create feedback loops to improve your learning process and that of future learners.

Shopware 6 from a Magento perspective (p16r.nl)

Shopware is a great platform and certainly worth considering as an alternative to Magento. Moving to Shopware from Magento requires a shift in thinking, both in code as in features and approaches.

You-Dont-Need-GUI (github.com)

As a computer expert, we want to be more efficient and do our jobs better. We know that command words may not be easily discoverable or mnemonic, so we try to list some common tasks that you might be tempted to do in GUI.

The Architecture Behind A One-Person Tech Startup (anthonynsimon.com)

Interestingly, I spent more time writing this post than actually setting up everything I described. At more than 6k words, and several weeks of on-and-off work, it’s pretty clear that I’m a slow writer.

Screw it, I’ll host it myself (markozivanovic.com)

It’s all fun and games until someone loses an eye. Likewise, it’s all fun and games until someone loses access to their private and/or business data because they trusted it to someone else.

Docker without Docker (fly.io)

Our users deliver software to us as Docker3 containers, but we don’t use Docker to run them. We transmogrify container images into Firecracker micro-VMs. Here’s how.

Open source cooking (opensource.cooking)

A diabolically simple site for finding and sharing recipes…a recipe site to end all recipe sites. Simply browse recipes by tag or search for ingredients and dishes. Submit your favourite recipe and it will be reviewed and added…

  1. Newline (frequently called line ending, end of line (EOL), line feed, or line break) is a control character or sequence of control characters in a character encoding specification (e.g. ASCII or EBCDIC) that is used to signify the end of a line of text and the start of a new one. Some text editors set this special character when pressing the ↵ Enter key. — Wikipedia
  2. Cross-site scripting (XSS) is a type of web application security vulnerability typically found in web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy. — Wikipedia
  3. Docker is a set of platform as a service (PaaS) products that use OS-level virtualization to deliver software in packages called containers. Containers are isolated from one another and bundle their own software, libraries and configuration files; they can communicate with each other through well-defined channels. Because all of the containers share the services of a single operating system kernel, they use fewer resources than virtual machines. — Wikipedia