Digests » 229
this week's favorite
This is the full story of how I ended up creating my own large-scale, distributed web crawler (in Python!). And especially how I dealt with the various technical challenges that ensued.
I was wondering recently after poring through yet another data breach how many people actually use multi-step verification. I mean here we have a construct where even if the attacker has the victim's credentials, they're rendered useless once challenged for the authenticator code or SMS which is subsequently set.
I've been thinking about how applications evolve, and what we might do if we're unhappy with the results. Three apparently unrelated ideas have been percolating in my head. In this newsletter I'll introduce each one and connect them together, in hopes that understanding these connections will help us understand our apps.
The trick to maintaining your sanity in these fast-moving times is to learn new stuff right between stages two and three, once your interest is piqued but while you’re still ahead of the curve.
Join over 15,500 readers for a free weekly email with fresh news, articles and tutorials.