System Architecture

System Architecture

7683 bookmarks
Custom sorting
How Kubernetes Reinvented Virtual Machines (in a good sense)
How Kubernetes Reinvented Virtual Machines (in a good sense)
How Virtual Machines are used to deploy services. What old problems containers solve and what new problems introduce. How Kubernetes used containers to recreate Virtual Machines?
·iximiuz.com·
How Kubernetes Reinvented Virtual Machines (in a good sense)
Brooks in Reverse
Brooks in Reverse
Fred Brooks observed in Mythical Man Month that adding more programmers to a project often slowed it down. The effect works in reverse, as Paul Graham noted in a 2001 essay, The Other Road Ahead: as groups get smaller, software development gets exponentially more efficient Graham was observing the early
·matt-rickard.com·
Brooks in Reverse
A First-Class Language Package Manager
A First-Class Language Package Manager
The history of modularization in JavaScript is a tedious one. ES Modules ("import") were introduced in 2015 and now seem to have broad support across different environments. But the precursor to ES Modules, CommonJS ("require"), is still widespread enough to require backward compatibility. And neither module system has an opinionated
·matt-rickard.com·
A First-Class Language Package Manager
Automating ACL's /w Capirca
Automating ACL's /w Capirca
This recording is part of the Packet Coders member Tech Sessions. Within this tech session we cover: What is Capirca? Overview of demo flows, and topology. Installation Components Integrations (SoT and Nornir) Demos ACL generation with CLI ACL generation with Python library Capirca integration with Nornir Challenge You can find
·packetcoders.io·
Automating ACL's /w Capirca
The story behind Google’s in-house desktop Linux
The story behind Google’s in-house desktop Linux
The best-known Google operating system is Chrome OS, but inside Google itself, the company also uses its own Linux desktop distro — gLinux.
·computerworld.com·
The story behind Google’s in-house desktop Linux
Practical Guide to Async, Threading & Multiprocessing
Practical Guide to Async, Threading & Multiprocessing
We discuss when you should async, threading and multiprocessing in Python and then we go through pitfalls in each multitasking option.
·itnext.io·
Practical Guide to Async, Threading & Multiprocessing
Securing Web APIs with Azure AD: Designing Authentication Schemes
Securing Web APIs with Azure AD: Designing Authentication Schemes
Posts in this series: A Case StudyDesigning Authentication SchemesIn our last post, I walked through my real-world scenario of needing to follow Zero Trust principles in securing microservice-based APIs inside (and outside) Azure. For our sample system, I'll simplify it a bit so that we have three applications: Server hosted
·jimmybogard.com·
Securing Web APIs with Azure AD: Designing Authentication Schemes
EOS free & open source icons
EOS free & open source icons
Commercial, non-commercial, use them as you please. EOS icons comes with an MIT license, has an open source community, and welcomes your collaboration too.
·eos-icons.com·
EOS free & open source icons
wasmCloud Documentation
wasmCloud Documentation
wasmCloud is a secure, distributed WebAssembly actor runtime
·wasmcloud.dev·
wasmCloud Documentation
4 Most Used REST API Authentication Methods
4 Most Used REST API Authentication Methods
There are any proprietary authentication methods and many variations of a few major approaches. Let's review the 4 most popular ones used by REST APIs
·blog.restcase.com·
4 Most Used REST API Authentication Methods
Keep track of innovations in digital banking
Keep track of innovations in digital banking
With Feedly’s new Neobanks AI model, you can effortlessly keep up with the growth and strategies of the world’s top 350 neobanks
·blog.feedly.com·
Keep track of innovations in digital banking
Why Observability Is Shifting Left
Why Observability Is Shifting Left
Why the “log everything and make sense later” approach to observability is broken.
·thenewstack.io·
Why Observability Is Shifting Left
Don't Be Scared of Cloud Lock-in
Don't Be Scared of Cloud Lock-in
Technology companies were right to care so much about vendor lock-in in the last two decades. In the past, developers were burned by IBM, Microsoft, and Oracle services, often with few alternatives and price gouging. But to align your strategy so vehemently against the same type of lock-in in the
·matt-rickard.com·
Don't Be Scared of Cloud Lock-in
Security requirements for new kernel features
Security requirements for new kernel features
The relatively new io_uring subsystem has changed the way asynchronous I/O is done on Linux systems and improved performance significantly. It has also, however, begun to run up a record of disagreements with the kernel's security community. A recent discussion about security hooks for the new uring_cmd mechanism shows how easily requirements can be overlooked in a complex system with no overall supervision.
·lwn.net·
Security requirements for new kernel features
Engineering Management During Wartime
Engineering Management During Wartime
What does incident management during the war in Ukraine teach us about contingency planning, engineering leadership and DevOps in crisis?
·thenewstack.io·
Engineering Management During Wartime