How Kubernetes Reinvented Virtual Machines (in a good sense)
How Virtual Machines are used to deploy services. What old problems containers solve and what new problems introduce. How Kubernetes used containers to recreate Virtual Machines?
Software Architecture and Design InfoQ Trends Report—April 2022
An overview of how the InfoQ editorial team sees the Software Architecture and Design topic evolving in 2022, with a focus on what architects are designing for today.
Fred Brooks observed in Mythical Man Month that adding more programmers to a project often slowed it down.
The effect works in reverse, as Paul Graham noted in a 2001 essay, The Other Road Ahead:
as groups get smaller, software development gets exponentially more efficient
Graham was observing the early
The history of modularization in JavaScript is a tedious one. ES Modules ("import") were introduced in 2015 and now seem to have broad support across different environments. But the precursor to ES Modules, CommonJS ("require"), is still widespread enough to require backward compatibility. And neither module system has an opinionated
This recording is part of the Packet Coders member Tech Sessions. Within this tech session we cover: What is Capirca? Overview of demo flows, and topology. Installation Components Integrations (SoT and Nornir) Demos ACL generation with CLI ACL generation with Python library Capirca integration with Nornir Challenge You can find
Securing Web APIs with Azure AD: Designing Authentication Schemes
Posts in this series: A Case StudyDesigning Authentication SchemesIn our last post, I walked through my real-world scenario of needing to follow Zero Trust principles in securing microservice-based APIs inside (and outside) Azure. For our sample system, I'll simplify it a bit so that we have three applications: Server hosted
Commercial, non-commercial, use them as you please. EOS icons comes with an MIT license, has an open source community, and welcomes your collaboration too.
Technology companies were right to care so much about vendor lock-in in the last two decades. In the past, developers were burned by IBM, Microsoft, and Oracle services, often with few alternatives and price gouging. But to align your strategy so vehemently against the same type of lock-in in the
The relatively new io_uring subsystem has
changed the way asynchronous I/O is done on Linux systems and improved
performance significantly. It has also, however, begun to run up a record
of disagreements with the kernel's security community. A recent
discussion about security hooks for the new uring_cmd mechanism
shows how easily requirements can be overlooked in a complex system with no
overall supervision.