Okay, maybe not everything you know about latency is wrong. But now that I have your attention, we can talk about why the tools and methodologies you use to measure and reason about latency are lik…
It was only a matter of time before somebody tried to bring BPF to the
kernel's CPU scheduler. At the end of January, Tejun Heo posted the second
revision of a 30-part patch series, co-written with David Vernet, Josh
Don, and Barret Rhoden, that does just that. There are clearly interesting
things that could be done by deferring scheduling decisions to a BPF
program, but it may take some work to sell this idea to the development
community as a whole.
Identity Distribution Is Essential for Modern API Security
It ensures that in the complex mesh of services comprising your API, every party handles requests securely and performs informed authorization decisions.
Using ChatGTP to convert human knowledge into machine actionable formats
Human knowledge has naturally for centuries been captured in human friendly formats such as books, intended to be consumed by, you guessed it, humans. But our world has changed dramatically and we now live in a space where this needs to be shared with computers. Machine driven processing, learning, or intelligence requires access to human knowledge in digital formats. We have more or less completed the transition from paper into formats such a PDF, Word, Excel, HTML, but these are unstructured and not easily consumable or understandable by software. We need to take this one step further and transition into machine friendly JSON, XML, or RDF formats, whose structured can be well described by standard specifications, schemas, and models. This is often perceived as a monumental task, but can AIs such a ChatGTP help?
How the Gherkin language bridges the gap between customers and developers
The Gherkin syntax helps you think through the process of a transaction with technology and then helps you write it down in a form that translates into programmer logic.
OpenZiti is dedicated to make the challenge of secure connectivity simple and accessible by replacing infrastructure with software. The world is software, your secure network needs to be software.
Graceful shutdown and zero downtime deployments in Kubernetes
In this article, you will learn how to prevent broken connections when a Pod starts up or shuts down. You will also learn how to shut down long-running tasks gracefully.
Pandemic Downtime Let Kraft Rebuild The IT Behind Patriots Football
In a lot of ways, the impact of the COVID-19 pandemic on The Kraft Group was no different than most other companies around the world. The organization – a
Architecture for Flow with Wardley Mapping, DDD, and Team Topologies
Susanne Kaiser illustrates the concepts of DDD, Wardley Mapping and Team Topologies, and demonstrates how these techniques help to evolve a fictitious legacy system for a fast flow of change.