Introducing Name Server Sets - DNSimple Blog
System Architecture
Wardley map - Wikipedia
LearnWardleyMapping.com | Learn Simon Wardley's approach to strategy in business.
We make better decisions when we understand who our work benefits, what those benefits are, and the system of capabilities that comes together to make it all happen. Though we are entangled with a vast global market that we cannot fully know, we can know more than we know now. That’s what Wardley Ma
Fork our open source onboarding program
The open source software team at G-Research is helping establish an easier on-ramp for getting started in open source.
The Main Goal: Secure the Application Workload
Customers do not need "cloud" security. What they require is a way to secure the application workload.
Test Automation Tools Unite!
With Container Executors, you can quickly automate new tests that are not supported by default on Testkube and make them part of your development life cycle.
Passwordless deployments to the cloud | The GitHub Blog
Discovering passwords in our codebase is probably one of our worst fears. But what if you didn’t need passwords at all, and could deploy to your cloud provider another way? In this post, we explore how you can use OpenID Connect to trust your cloud provider, enabling you to deploy easily, securely and safely, while minimizing the operational overhead associated with secrets (for example, key rotations).
5 Ways to Improve Your Web Application and API Security
Implementing strong security measures will not only stop attackers, but help you stay informed about current threats while protecting your organization.
Making It Easier To Break The SONiC Barrier For Networking
Thanks to the ubiquity of the X86 server platform, the Kubernetes container controller, and the KVM server virtualization hypervisor, it is relatively
8.1. Numeric Types
8.1. Numeric Types 8.1.1. Integer Types 8.1.2. Arbitrary Precision Numbers 8.1.3. Floating-Point Types 8.1.4. Serial Types Numeric types consist of two-, …
ULID Identifiers and ULID Tools Website
Historically, when I wanted to store data in a database, I (or the project/team I was on) used an incrementing integer to uniquely identify each row (e.g. the SERIAL type in PostgreSQL).
Explanations - X Window System Basics
Deploying secure Elixir apps with Google Secret Manager - Knock Down Silos by Slab
How we improved sharing and managing our application secrets within a team environment.
Navigate your way to production bliss with Caretta
Get to know Caretta - a lightweight, standalone tool that instantly creates a visual network map of the services running in your cluster. Caretta leverages eBPF to efficiently map service network interactions in a K8s cluster, and Grafana to query & visualize the collected data.
Developer Portal
Cutting Database Costs: Comcast, Rakuten, Expedia and iFood
A look at how several dev teams significantly reduced database costs while actually improving database performance.
Wolfram|Alpha as the Way to Bring Computational Knowledge Superpowers to ChatGPT
Accessing Wolfram|Alpha's computational knowledge with ChatGPT--an ideal alliance of precise combination with human-like expression of ideas. Stephen Wolfram explains how.
Extending the Android SDK
Valid8.com Simulators, Emulators, Network Conformance Testing Tools
Mobile,fixed network testing. Load,conformance,emulation,feature,3GPP standards test. 5G,4G/LTE,3G/UMTS,IoT,IMS Core,VoIP,SIP,radius,diameter,sctp,tcp,udp,P25 ISSI/CSSI,MCX,mission critical communications.
Grokking RISC-V Vector Processing
While the basic idea of vector processing is simple, the details can get complex. The purpose of this story is to explain the fundamental idea of vector processing and how that has been implemented…
PyTorch Poisoned in Software Supply Chain Attack
If you downloaded PyTorch-nightly on Linux via pip between Dec. 25, 2022, and Dec. 30, 2022, you've got trouble.
What Is Multi-Access Edge Computing?
Multi-access edge computing helps to move traffic computation from central cloud to more of an edge environment. Learn more about MEC.
Use this open source API gateway to scale your API
Adopt an API-Led architecture with Apache APISIX.
How to Use Time-Stamped Data to Reduce Network Downtime
Telecommunication organizations need to ensure they have the necessary resources and technology to maintain service uptime SLAs.
How to Overcome Challenges in an API-Centric Architecture
Although an API-led approach is key to enable agility, several hurdles can develop due to the wide use of APIs and API reuse.
You’re Wasting Your Time with Incident Management
What keeps your systems running? People do. No matter how sophisticated your technology, it will only succeed with a social system designed to support it effectively.
Default setup: A new way to enable GitHub code scanning | The GitHub Blog
Default setup is a new way to automatically set up code scanning on your repository, without the use of a .yaml file.
The IO monad
The IO container forms a monad. An article for object-oriented programmers.
Exaloop
Modernizing high-performance computing.
Store app state in urls