Suggested Reads

Suggested Reads

54946 bookmarks
Newest
I/O is no longer the bottleneck
I/O is no longer the bottleneck
In 2022, disk I/O is very fast, and not usually the performance bottleneck in programs. This article digs into some numbers.
·benhoyt.com·
I/O is no longer the bottleneck
Action required: Upgrade Windows clients to v1.32.3
Action required: Upgrade Windows clients to v1.32.3
Tailscale has recently been notified of security vulnerabilities in the Tailscale Windows client which allow a malicious website visited by a device running Tailscale to change the Tailscale daemon configuration and access information in the Tailscale local and peer APIs.
·tailscale.com·
Action required: Upgrade Windows clients to v1.32.3
Ouch! Ransomware gang says it won’t attack AirAsia again due to the “chaotic organisation” and sloppy security of hacked airline’s network
Ouch! Ransomware gang says it won’t attack AirAsia again due to the “chaotic organisation” and sloppy security of hacked airline’s network
The Daixin ransomware gang has given a humiliating slap in the face to Air Asia, which lost the personal data of five million passengers and all of its employees earlier this month.
·grahamcluley.com·
Ouch! Ransomware gang says it won’t attack AirAsia again due to the “chaotic organisation” and sloppy security of hacked airline’s network
Know before you Go – serverless containers at AWS re:Invent 2022
Know before you Go – serverless containers at AWS re:Invent 2022
This re:Invent, the Amazon Elastic Container Service (Amazon ECS) and the AWS Fargate teams will be presenting new capabilities, best practices, and tips to amplify business agility, shorten time to market, and increase productivity for organizations in their application modernization journey. To learn more, join us in Las Vegas from November 28 through December 2. […]
·aws.amazon.com·
Know before you Go – serverless containers at AWS re:Invent 2022
Exposing Kubernetes Applications, Part 1: Service and Ingress Resources
Exposing Kubernetes Applications, Part 1: Service and Ingress Resources
Introduction The Exposing Kubernetes Applications series focuses on ways to expose applications running in a Kubernetes cluster for external access. In this Part 1 of the series, we explore Service and Ingress resource types that define two ways to control the inbound traffic in a Kubernetes cluster. We discuss the handling of these resource types […]
·aws.amazon.com·
Exposing Kubernetes Applications, Part 1: Service and Ingress Resources
Exposing Kubernetes Applications, Part 2: AWS Load Balancer Controller
Exposing Kubernetes Applications, Part 2: AWS Load Balancer Controller
Introduction The Exposing Kubernetes Applications series focuses on ways to expose applications running in a Kubernetes cluster for external access. In Part 1 of the series, we explored Service and Ingress resource types that define two ways to control the inbound traffic in a Kubernetes cluster. We discussed the handling of these resource types via […]
·aws.amazon.com·
Exposing Kubernetes Applications, Part 2: AWS Load Balancer Controller
Exposing Kubernetes Applications, Part 3: NGINX Ingress Controller
Exposing Kubernetes Applications, Part 3: NGINX Ingress Controller
Introduction The Exposing Kubernetes Applications series focuses on ways to expose applications running in a Kubernetes cluster for external access. In Part 1, we explored Service and Ingress resource types that define two ways to control the inbound traffic in a Kubernetes cluster. We discussed handling of these resource types via Service and Ingress controllers, […]
·aws.amazon.com·
Exposing Kubernetes Applications, Part 3: NGINX Ingress Controller