Field Guide to the Distributed Development Stack

by Andrew Odewahn

DescriptionDetailsHashtagsReport an issue

Book Description

When you explore a new technology landscape, the journey can take you to places you never expected. Take O'Reilly's CTO, Andrew Odewahn. While working on ideas for a new publishing platform, Andrew kept notes as he probed the depth and breadth of what we call the "distributed development stack" (DDS).

As patterns emerged, and as Andrew mentioned them to his co-workers, people started borrowing his "field guide." His detailed notes helped them avoid pitfalls and saved a lot of time. As Andrew's notes grew, so did the number of people who wanted them.

What started as his own journal soon became the Field Guide to the Distributed Development Stack, an ongoing collaborative project. This report is a snapshot of what the Field Guide includes to date, but the guide and the framework are meant to be a living resource. So, we put the source on GitHub and invite you to contribute. If you feel the Guide is missing a tool or a major theme, then fork the repo and send along a pull request.

You'll find contribution details inside the report, along with a framework full of useful tools and ideas.

This open book is licensed under a Creative Commons License (CC BY). You can download Field Guide to the Distributed Development Stack ebook for free in PDF format (12.8 MB).

Book Details

Subject
Computer Science
Publisher
O'Reilly Media
Published
2014
Pages
39
Edition
1
Language
English
ISBN13 Digital
9781491916582
ISBN10 Digital
1491916583
PDF Size
12.8 MB
License
CC BY

Related Books

Estimating Illicit Financial Flows
Illicit financial flows constitute a global phenomenon of massive but uncertain scale, which erodes government revenues and drives corruption in countries rich and poor. In 2015, the countries of the world committed to a target to reduce illicit flows, as part of the UN Sustainable Development Goals. But five years later, there is still no agreemen...
The Security Development Lifecycle
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs - the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team ...
Re-Inventing Africa's Development
This book analyses the development problems of sub-Sahara Africa (SSA) from the eyes of a Korean diplomat with knowledge of the economic growth Korea has experienced in recent decades. The author argues that Africa's development challenges are not due to a lack of resources but a lack of management, presenting an alternative to the traditional view...
Russia's Turn to the East
This book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly – have changed since the onset of the Ukraine crisis and Russia's annexation of Crimea. Following the 2014 annexation and the subsequent enactment of a sanctions regime against the country, the Kremlin has emphasized the easter...
The Design and Implementation of the Anykernel and Rump Kernels
The mission of the first edition of this book was to introduce the anykernel and rump kernels and motivate their existence. Additionally, we explored the characteristics of the technology through various experiments. The paramount, often criminally overlooked experiment was the one hiding in plain sight: is it possible to construct the system in a ...
Essentials of Business Analytics
This comprehensive edited volume is the first of its kind, designed to serve as a textbook for long-duration business analytics programs. It can also be used as a guide to the field by practitioners. The book has contributions from experts in top universities and industry. The editors have taken extreme care to ensure continuity across the chapters...