Categories
Uncategorized

Domain Design & Event Sourcing Videos

The Single Responsibility Principle — Robert C Martin (June 2014)

An annoyingly pedantic talk that covers the basics of why we separate concerns in software. He covers the fundamental SOLID principle of single responsibilty: separate things that change for different reasons, and group together things that change for the same reasons.

Martin pontificates for many minutes about different anti-patterns found in software and business, and manages to talk down to the audience while he does it.

My Take: This is a skippable video as it doesn’t cover much more than that very basics of what SRP is, which you can glean faster than listening to this dude. As well, Martin doesn’t really address the differeing complexities of a large business vs. a small business.

Domain Modeling Made Functional — Scott Wlashin

Representing State The Kotlin Edition — Christina Lee (KotlinConf 2018)

Event Sourcing is Actually Just Functional Code — Greg Young

CQRS And Event Sourcing — Greg Young

Domain Drivin Design, Event Sourcing and CQRS With F# and EventSource

Categories
Uncategorized

Found in the Twilio TOS

Presented without comment

Twilio Terms of Service
Twilio Terms of Service

Categories
Uncategorized

Describe the benefits of using Directory Services with Xsan

Because Xsan is simply another file system, it adheres to the file system permissions built into Mac OS X, including permissions established in a central LDAP directory. Whether you use Open Directory, Active Directory, or another enterprise LDAP service,
Xsan accesses information in the directory accounts that you have in placemaking it easy to share permissions across computers.

You can use Xsan administration tools to set user and group permissions, as well as
access privileges, at several levels:
Restrict user access to folders on a volume by specifying owner, group, and general
access permissions.
Unmount a SAN volume from selected client computers.
Restrict a client computer to read-only access to a volume.
Remove a client from a SAN.

Categories
Uncategorized

Can a user be a member of more than one group? Can a computer be a member of more than one computer list?

Can a user be a member of more than one group?
YES

Can a computer be a member of more than one computer list?
NO

Categories
Uncategorized

Where can I find (view) the actual Kerberos tickets themselves?

/System/Library/CoreServices

Categories
Uncategorized

Identify new features of User account creation in Mac OS X 10.4?

Parental Controls:
mail – allowed mail to be sent to list

Finder – Some limits, simple finder
– open all sys prefs, modify dock, administer printers, born CDs, allow supporting programs, change password
– set which apps can be opened

ichat – allow user to chat with (list)

Safari – must be logged in with that account to edit the sites list

Dictionary – on/off (when set to on, profanities can be used in dictionary)

Categories
Uncategorized

If using both L2TP and PPTP for VPN configuration, what must you make sure of?

that the IP ranges for each protcol do not overlap

Categories
Uncategorized

What authentication method (not tunneling protocol) is supported by default for VPN connections? Can other authentication methods be used?

MS-CHAPv2 supported by default

Other authentication methods can be used with advanced configuration.

Categories
Uncategorized

What does NAT stand for and what else is it known by?

NAT: network address translation

also known as IP masquerading or IP aliasing

Categories
Uncategorized

What is the location and name of the kernal panic log file?

/Library/Logs/panic.log