SlideShare uma empresa Scribd logo
1 de 37
Baixar para ler offline
Quotables
Quotes
If debugging is the process of
removing errors from a design,
then
designing must be the process of
putting errors into a design!
2016 GDC Diablo talk: let's switch from
turn-based to real-time
2017 GDC Civilization talk: let's switch
from real-time to turn-based
Encrypted traffic has a fingerprint, enough
to distinguish among 200 Netflix vids
with 99.5% accuracy
in < 2.5 mins
25%
Internet traffic generated by Google
At peak Netflix is responsible over
37% of Internet traffic
10^15synapses activated per
second in human brain
2/3rds
fail
Our DNA sequencers produce more than
20 Terabytes of genomic data per day
and they run 365 days a year
50 billion
of your cells replaced each day
2 million
new red blood cells per second
First you learn the value of abstraction
Then you learn the cost of abstraction
Then you are ready to engineer
Don't explain code quality to execs
Explain high cost of change
Explain slowing down of innovation
Explain longer cycle times
The point of Amazon isn't to offer a
consumer the lowest price possible
It's to offer the lowest price possible given
the convenience that Amazon offers
Async is not about
performance
It is about scalability
There is no such thing as
a stateless architecture
It's just someone else's problem
Hours of video served per day
Facebook: 100 million
Netflix: 116 million
YouTube: 1 billion
Everybody wants to write reusable code
Nobody wants to reuse
anyone else's code
Apple R&D budget

$10 billion
NASA science budget

$5 billion
SpaceX, $12 billion valuation
Launches 70m rockets into space and
lands them safely
Snapchat, $20 billion valuation
Rainbow Filters
1997: Let’s make a website!
fires up vi
2007: Let’s make a website!
downloads jQuery, fires up vi
2017: Let’s make a website!
[very long list of tech]
18mins
Latency to Mars
CAP theorem
It's impossible for a distributed computer system to
simultaneously provide more than 2 out of 3 of the
following guarantees
Consistency. Availability. Partition tolerance
There are only 2 hard problems in
distributed systems
1. Guaranteed order of messages
2. Exactly-once delivery
If you can’t build a well-
structured monolith,
what makes you think
microservices is the answer?
Microservices without asynchronous
messaging is actually a monolith
with really slow and error prone
method invocation
There is no Internet of Things.
There are only many unpatched,
vulnerable small computers on the
Internet
98s
Before camera infected
with malware
Let's Encrypt now the 3rd
largest CA, after Comodo and
Symantec, comprising over 13%
of the SSL cert market share
$2.91M cost of running
Let's Encrypt
8,000
Questions per day asked
on StackOverflow
66%
loss of installs when apps
> 100MB
A single photon carries
10 Bits of Information!
10 years ago, backends were monolithic
services and frontends many pages
Now frontends are monolithic pages and
backends many services
AWS Lambda, you are charged for every
100ms your code executes and the
number of times your code is triggered.
The 1970ies are back
8,000 bugs
found in pacemaker codes,
leaving them vulnerable to hackers
3%
Global electricity supply consumed
by data centers
Hardware tries so hard
to make software fast
Software tries so hard
to make hardware slow

Mais conteúdo relacionado

Semelhante a Quotables Quotes

Glocomms market report april 2018
Glocomms market report april 2018Glocomms market report april 2018
Glocomms market report april 2018Charlie Critchley
 
CLT Legal Cloud Conference
CLT Legal Cloud ConferenceCLT Legal Cloud Conference
CLT Legal Cloud ConferenceJustin Pirie
 
OIT Technology, Communications, Japan
OIT Technology, Communications, JapanOIT Technology, Communications, Japan
OIT Technology, Communications, JapanChristos Makiyama
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec
 
SIO6002 - S2
SIO6002 - S2SIO6002 - S2
SIO6002 - S2gauvins
 
Create Your Future with z Systems Cloud
Create Your Future with z Systems CloudCreate Your Future with z Systems Cloud
Create Your Future with z Systems CloudCA Technologies
 
How to prevent cyber terrorism taragana
How to prevent cyber terrorism  taraganaHow to prevent cyber terrorism  taragana
How to prevent cyber terrorism taraganaGilles Sgro
 
Tsoc Feb09 Bannink V41
Tsoc Feb09 Bannink V41Tsoc Feb09 Bannink V41
Tsoc Feb09 Bannink V41Chris Bannink
 
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...adamdeja
 
Siegel decentral talk
Siegel decentral talkSiegel decentral talk
Siegel decentral talkDavid Siegel
 
Software Architecture Conference - Monitoring Microservices - A Challenge
Software Architecture Conference -  Monitoring Microservices - A ChallengeSoftware Architecture Conference -  Monitoring Microservices - A Challenge
Software Architecture Conference - Monitoring Microservices - A ChallengeAdrian Cockcroft
 
Software engineering unit 1
Software engineering  unit 1Software engineering  unit 1
Software engineering unit 1Sumit Paul
 
IMCSummit 2016 Keynote - Abe Kleinfeld - The In-Memory Computing Landscape: L...
IMCSummit 2016 Keynote - Abe Kleinfeld - The In-Memory Computing Landscape: L...IMCSummit 2016 Keynote - Abe Kleinfeld - The In-Memory Computing Landscape: L...
IMCSummit 2016 Keynote - Abe Kleinfeld - The In-Memory Computing Landscape: L...In-Memory Computing Summit
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?Saumil Shah
 
L'impatto della sicurezza su DevOps
L'impatto della sicurezza su DevOpsL'impatto della sicurezza su DevOps
L'impatto della sicurezza su DevOpsGiulio Vian
 
Elastically scalable architectures with microservices. The end of the monolith?
Elastically scalable architectures with microservices. The end of the monolith?Elastically scalable architectures with microservices. The end of the monolith?
Elastically scalable architectures with microservices. The end of the monolith?Javier Arias Losada
 
2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...
2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...
2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...Shawn Wells
 
Java and the future of the network
Java and the future of the networkJava and the future of the network
Java and the future of the networkscoobeesnac
 
Secure protocol design for decentralized world
Secure protocol design for decentralized worldSecure protocol design for decentralized world
Secure protocol design for decentralized worldHacken
 

Semelhante a Quotables Quotes (20)

Glocomms market report april 2018
Glocomms market report april 2018Glocomms market report april 2018
Glocomms market report april 2018
 
CLT Legal Cloud Conference
CLT Legal Cloud ConferenceCLT Legal Cloud Conference
CLT Legal Cloud Conference
 
OIT Technology, Communications, Japan
OIT Technology, Communications, JapanOIT Technology, Communications, Japan
OIT Technology, Communications, Japan
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising Deck
 
SIO6002 - S2
SIO6002 - S2SIO6002 - S2
SIO6002 - S2
 
Create Your Future with z Systems Cloud
Create Your Future with z Systems CloudCreate Your Future with z Systems Cloud
Create Your Future with z Systems Cloud
 
How to prevent cyber terrorism taragana
How to prevent cyber terrorism  taraganaHow to prevent cyber terrorism  taragana
How to prevent cyber terrorism taragana
 
Technology fads: Weighing risks and benefits
Technology fads: Weighing risks and benefitsTechnology fads: Weighing risks and benefits
Technology fads: Weighing risks and benefits
 
Tsoc Feb09 Bannink V41
Tsoc Feb09 Bannink V41Tsoc Feb09 Bannink V41
Tsoc Feb09 Bannink V41
 
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
 
Siegel decentral talk
Siegel decentral talkSiegel decentral talk
Siegel decentral talk
 
Software Architecture Conference - Monitoring Microservices - A Challenge
Software Architecture Conference -  Monitoring Microservices - A ChallengeSoftware Architecture Conference -  Monitoring Microservices - A Challenge
Software Architecture Conference - Monitoring Microservices - A Challenge
 
Software engineering unit 1
Software engineering  unit 1Software engineering  unit 1
Software engineering unit 1
 
IMCSummit 2016 Keynote - Abe Kleinfeld - The In-Memory Computing Landscape: L...
IMCSummit 2016 Keynote - Abe Kleinfeld - The In-Memory Computing Landscape: L...IMCSummit 2016 Keynote - Abe Kleinfeld - The In-Memory Computing Landscape: L...
IMCSummit 2016 Keynote - Abe Kleinfeld - The In-Memory Computing Landscape: L...
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?
 
L'impatto della sicurezza su DevOps
L'impatto della sicurezza su DevOpsL'impatto della sicurezza su DevOps
L'impatto della sicurezza su DevOps
 
Elastically scalable architectures with microservices. The end of the monolith?
Elastically scalable architectures with microservices. The end of the monolith?Elastically scalable architectures with microservices. The end of the monolith?
Elastically scalable architectures with microservices. The end of the monolith?
 
2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...
2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...
2011-08-10 In-Q-Tel Technology Focus Day, Trends & Observations in Open Sourc...
 
Java and the future of the network
Java and the future of the networkJava and the future of the network
Java and the future of the network
 
Secure protocol design for decentralized world
Secure protocol design for decentralized worldSecure protocol design for decentralized world
Secure protocol design for decentralized world
 

Último

『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 

Último (9)

『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 

Quotables Quotes