Polymath Engineer Weekly #99
Hardware Security, Box Plots, Anomaly Detection, Cybersecurity Career, GJK Algorithm, Hypertrophy Genetics and Software Philosophy
Hello again. Almost 100 posts, let’s go!
Comic of the week
Links of the week
The Secure Enclave is a dedicated secure subsystem integrated into Apple systems on chip (SoCs). The Secure Enclave is isolated from the main processor to provide an extra layer of security and is designed to keep sensitive user data secure even when the Application Processor kernel becomes compromised. It follows the same design principles as the SoC does—a boot ROM to establish a hardware root of trust, an AES engine for efficient and secure cryptographic operations, and protected memory.
I’ve Stopped Using Box Plots. Should You?
I used to use box plots often, but I rarely use them now. In fact, virtually never. Why not? Well, if you watched the explanatory video linked above, you saw that it took me over four minutes to explain how to read a box plot. If a chart type requires that much time to explain, it had better deliver a huge “epiphany payoff,” as data storytelling expert Brent Dykes calls it, i.e., it had better deliver valuable insights that can’t be communicated using simpler, more familiar chart types that require less time and effort for the audience to understand.
How to use Prometheus for anomaly detection in GitLab
One of the more basic functions of the Prometheus query language is real-time aggregation of time series data. Andrew Newdigate, a distinguished engineer on the GitLab infrastructure team, hypothesized that Prometheus query language can also be used to detect anomalies in time series data.
Andrew broke down the different ways Prometheus can be used for the attendees of Monitorama 2019. This blog post explains how anomaly detection works with Prometheus and includes the code snippets you’ll need to try it out for yourself on your own system.
Do you want to be the first to know about new posts? Subscribe now for FREE. Just cool content, no SPAM!
How to Build a Cybersecurity Career
Having a lab is essential. It’s actually one of the first things I ask when I’m looking at candidates during interviews. I ask what kind of lab or network they have to play with, and if they reply that they don’t have either I thank them for their time.
The lab is where you learn. The lab is where you run your projects. The lab is where you grow.
the Gilbert–Johnson–Keerthi algorithm explained as simply as possible
The GJK algorithm is a weird way to do a simple thing.
We have shape A and shape B, and we'd like to determine if they overlap.
A shape is a set of infinitely many points. If there exists any point that's a member of both sets, then the shapes overlap.
What are Genetics for working out and bodybuilding explained with Hypertrophy Coach Joe Bennett
This video explores the role of genetics in bodybuilding. He explains what genetics are and how they affect muscle growth potential, body structure, and even muscle insertions. He also discusses how to overcome genetic limitations through hard work and consistency.
I have created a survey to get feedback from you. It takes only 2 minutes.
Book of the week
A Philosophy of Software Design
Have a nice week. 😉
Have you read last week's post? Check the archive.