The Ultimate Guide To Software Architecture Documentation
This guide shows you how to write, structure, visualize and manage software architecture documentation in a lean way using appropriate documentation tools.
A proposed threat model for confidential computing
The field of confidential computing is still in its infancy, to the point
where it lacks a clear, agreed, and established problem description. Elena
Reshetova and Andi Kleen from Intel recently
started the conversation by sharing their view of a potential threat
model in the form of this
document, which is specific to the Intel Trust Domain Extension (TDX)
on Linux, but which is intended to be applicable to other
confidential-computing solutions as well. The resulting conversation
showed that there is some ground to be covered to achieve a consensus on
the model in the community.
Istio Architecture for Kubernetes: The Good, the Bad & the Ugly
Find out what Istio is, how the Istio architecture works, which benefits Istio offers to Kubernetes and what to watch out for when getting started with Istio virtual services in a Kubernetes cluster.
Okay, maybe not everything you know about latency is wrong. But now that I have your attention, we can talk about why the tools and methodologies you use to measure and reason about latency are lik…
It was only a matter of time before somebody tried to bring BPF to the
kernel's CPU scheduler. At the end of January, Tejun Heo posted the second
revision of a 30-part patch series, co-written with David Vernet, Josh
Don, and Barret Rhoden, that does just that. There are clearly interesting
things that could be done by deferring scheduling decisions to a BPF
program, but it may take some work to sell this idea to the development
community as a whole.
Identity Distribution Is Essential for Modern API Security
It ensures that in the complex mesh of services comprising your API, every party handles requests securely and performs informed authorization decisions.
Using ChatGTP to convert human knowledge into machine actionable formats
Human knowledge has naturally for centuries been captured in human friendly formats such as books, intended to be consumed by, you guessed it, humans. But our world has changed dramatically and we now live in a space where this needs to be shared with computers. Machine driven processing, learning, or intelligence requires access to human knowledge in digital formats. We have more or less completed the transition from paper into formats such a PDF, Word, Excel, HTML, but these are unstructured and not easily consumable or understandable by software. We need to take this one step further and transition into machine friendly JSON, XML, or RDF formats, whose structured can be well described by standard specifications, schemas, and models. This is often perceived as a monumental task, but can AIs such a ChatGTP help?
How the Gherkin language bridges the gap between customers and developers
The Gherkin syntax helps you think through the process of a transaction with technology and then helps you write it down in a form that translates into programmer logic.