Dockerfiles are a constant source of frustration in the container ecosystem.
First, they are difficult to write (well). They can't express all types of build
graphs – only linear graphs are easily expressible, limiting the amount of
parallelism one can do (i.e., how fast your builds can be). Finally, they
Spend any time in complex systems and you know the first line of defense against
tough-to-debug bugs is a reproducible process. You'd think that most software we
write is reproducible – but there are many places where it isn't.
Files get overwritten. Different machines have slightly different configuration.
One step of
Every Sufficiently Advanced Configuration Language is Wrong
Every sufficiently advanced configuration language is the wrong tool for the job.
For basic configuration, YAML or JSON is usually good enough. It falls apart when you try to do more:
* Template it with a templating engine
* Use esoteric language features to reuse code (anchors and aliases)
* Patch or modify
I spent some time going over the Postgres schema of Gitlab. GitLab is an alternative to Github. You can self host GitLab since it is an open source DevOps platform. My motivation to understand the …
Persuasive Design: Using Advanced Psychology Effectively
Persuasive design isn’t evil. It’s a tool, and like any tool, it can be misused. However, with the right research and thoughtful application, it can be a valuable addition to any designer’s toolkit. Using persuasive design, social and psychological principles can be used to influence user behavior.
Persuasive Design Patterns—Design experiences that enhance and align with motivations by Jenny Shen
Just because people can do something does not guarantee that they will. Firstly, they must be motivated. Secondly, they must be persuaded to make decisions. Understanding the emotions that support the desired behavior is the key to conversion.
When used properly and ethically, persuasive design principles are powerful tools for building meaningful products that help people make better decisions and boost UX. #product #startup #tips #web #app #design #ux #ui
The Best Collections of Real UX/UI Design Patterns
Looking for inspiration and examples of best practices for designing your apps, software, screen flows and products? Look no further than this comprehensive collection of Design Pattern resources.
10 Things You've Been Wondering About FIDO2, WebAuthn, and a Passwordless World
Yubico has been working closely with Microsoft, Google, the FIDO Alliance and W3C to create and drive open standards that pave the way for the future of passwordless login. Learn more about the most commonly asked questions regarding FIDO2, the Security Key by Yubico, and the evolution of a passwordless world.
FIDO Alliance and W3C have a plan to kill the password – TechCrunch
By now it’s crystal clear to just about everyone that the password is a weak and frankly meaningless form of authentication, yet most of us still live under the tyranny of the password. This, despite the fact it places a burden on the user, is easily stolen and mostly ineffective. Today, two …
FIDO Alliance - Open Authentication Standards More Secure than Passwords
FIDO Alliance is focused on providing open and free authentication standards to help reduce the world’s reliance on passwords, using UAF, U2F and FIDO2.
FIDO Alliance and W3C Achieve Major Standards Milestone in Global Effort Towards Simpler, Stronger Authentication on the Web - FIDO Alliance
With support from Google Chrome, Microsoft Edge and Mozilla Firefox, FIDO2 Project opens new era of ubiquitous, phishing-resistant, strong authentication to protect web users worldwide MOUNTAIN VIEW, Calif., and https://www.w3.org/ […]
This document describes a mechanism for creating, encoding, and verifying digital signatures or message authentication codes over components of an HTTP message. This mechanism supports use cases where the full HTTP message may not be known to the signer, and where the message may be transformed (e.g., by intermediaries) before reaching the verifier.
This document also describes a means for requesting that a signature be applied to a subsequent HTTP message in an ongoing HTTP exchange.
HMACs and MACs are authentication codes and are often the backbone of JWT authentication systems. A Message Authentication Code (MAC) is a string of bits that depends on a secret key and is sent with a message to prove the message wasn’t tampered with. HMACs are a more strict version of MACs that offer additional security benefits.
MAC - Message Authentication Code MACs are exactly what they sound like; small codes that allow receivers of messages to know who the sender was (authentication).