…ten times the effort to fix a single issue in Stacker that it's going to take Sam. And the odds are that even that is not enough to appreciate the internal coherency of the system, which means that the fix is likely to be a butcher's job, and Sam will have to rewrite it afterwards anyway.
To broaden the base of knowledge, you're going to have to let someone else not only spend considerable effort getting up to speed. Then you're going to have them deal with more than …
When Sam saw these requests he was very perplexed, because his app doesn't make any AJAX requests. Where are these requests coming from? If you search for some of the listed domains, you'll find that many of them are, or are suspected of, being malware-related. Our best guess is that these AJAX requests are made by malware extensions in the visiting users' browsers.
You may notice as well that the throughput in requests per minute (rpm) is very small — much smaller than …
Sam is a creative developer and her humour punctuates her work. Her blog showcases her particular mix of creativity and humour, with quite pointed insight into the development process and community
Her first project was: Forage , a website built to let gardeners swap their excess produce with others.
Alberto moved here all the way fromwith his girlfriend in order to learn development. He's studying full-stack development, and his girlfriend …
We ultimately want 37signals to have the potential of being the last job our people ever need. When you think about what it'll take to keep someone happy and fulfilled for 10, 20, 30 years into the future, you adopt a very different vantage point from our industry norm.
…Here's what the notes look like from that first conversation with Sam.back in early July for our first walkthrough of phone verification. Hearing Sam talk about "creating a verification profile" or "completing a verification challenge" familiarized me with the terminology and flows that would be helpful descriptors in my bug reports.
Step 2. After the introduction I'll dive right into clicking around in a staging or beta environment to …
* Sam here . The goal of this is to get your mind wired into performance-driven development. We'll explore, diagnose and fix a variety of performance problems to reinforce your skills as a user of .and Ben Weintraub presented on the New Relic Performance Code Kata. Their slides can be found
*spoke on how many of the same principles that guide our software design can guide our software architecture. To review or learn more, see …
…about Google Reader. Not much mention of any specific feature that dies with it. — Sam Schenkman-Moore (@ samsm) March 14, 2013
Must be frustrating. Google Reader competitors reading this whining get no insight into what to create to replace it. — Sam Schenkman-Moore (@ samsm) March 14, 2013
So as a sort of PSA to whomever builds the next feed reader I wind up using, here's what I think makes Google Reader so special: speed and magic.
Join us for a presentation from Sam Parnell,of : Making Bleacher Report Fast and Reliable: Building Scalable Apps to Support Big Spikes in Traffic
Sam will discuss how Bleacher Report — the third-most-visited sports news destination online — uses New Relic and Blitz to develop, manage, monitor and tune its apps, in order to ensure superior performance for 40+ million sports fans and for tenfold traffic increases during hot sports news.,
Pro forma secrecy. The secrecy may be more imaginary than real. For instance the name of the club and its membership are usually obvious to all. There may be a desire to create secret codes and plans, but they are rarely implemented. A ramshackle den, tree house , clubhouse, fort, or "secret base" may be built in nearby scrub-land or an abandoned building.
Link (Thanks, Sam)
Map of That Shows Scariest Thing In Each State
is from of Sam; is from Zombie Lincoln. But that's just ridiculous. Everyone knows the thing most feared in is Werewolf Corn.