Emil Koutanov ꙮ

@IsTheArchitect

Devout software architect, an engineer, and a dad. Also an avid author, blogger, and storyteller. Maintainer of Kafdrop. 🇦🇺

Sydney
Vrijeme pridruživanja: travanj 2012.

Tweetovi

Blokirali ste korisnika/cu @IsTheArchitect

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @IsTheArchitect

  1. Prikvačeni tweet
    22. sij

    Thinking it might be time to add a service mesh to your cluster, or just want to know what it is? Read on.

    Poništi
  2. ...or some other, utterly esoteric characteristic, without even considering CAP. Most systems are better off with or , to be frank. Do you really need the sort of query volume that justifies an AP system, and are you not better off implementing instead?

    Prikaži ovu nit
    Poništi
  3. As a distributed systems designer, and someone who routinely consults clients on these sorts of topics, ignorance never ceases to amaze, and often scare me. How many times have I heard "We went with <database X> because it had a nicer query language".

    Prikaži ovu nit
    Poništi
  4. Repair System isn’t an “I’ll study it later” feature. It is a requirement for production environments. How many pick a particular product based on a particular bell or whistle, with no regard to consistently models.

    Prikaži ovu nit
    Poništi
  5. Not overly surprising. , previously an FP poster child on the lost a lot of popularity when 8 came out with Lambdas and method references. Then when you consider 's popularity, it makes sense for to take no. 2. via

    Poništi
  6. How to configure Vault as a certificate signing authority, via Currently looking at using Vault as a CA in via cert-manager, in favour of ACM Private CA. Anyone had good/bad experiences?

    Poništi
  7. Poništi
  8. Introductory text on service accounts. Shows how to access the token and certificate from the context of a pod. Useful when invoking the Kubernetes API from within a pod.

    Poništi
  9. Service-level authorization in using , with worked examples. Thanks to . Bear in mind, RBAC ServiceRole and ServiceRoleBindings have since been deprecated; now the equivalent can be achieved with AuthorizationPolicy.

    Poništi
  10. A step-by-step guide for enabling mutual for securing East-West traffic between deployed in an service mesh. Thanks to .

    Poništi
  11. Distinguishing causality from circumstantial correlation using . These are initial strides, but a positive outcome could be a breakthrough in computational medicine.

    Poništi
  12. I don't so much care for CPUs. (Go !) There's a valuable lesson here nonetheless, which applies to much smaller companies and even teams and individuals. You must not succumb to complacency; you are _never_ too big to fail, especially when your competition has less to lose.

    Prikaži ovu nit
    Poništi
  13. Admittedly not an apples-to-apples comparison, but it's still interesting to see chip away at a much bigger rival.

    Prikaži ovu nit
    Poništi
  14. Anyway, the idea of an interim step between an ungoverned service fabric and a fully-fledged may have its uses, particularly for those struggling to retrofit to legacy. Something as simple as can provide several benefits, and also does not require .

    Prikaži ovu nit
    Poništi
  15. It is rare that one gets to see the word 'lite' in a Citrix article. Can you imagine 'desktop streaming lite'.

    Prikaži ovu nit
    Poništi
  16. These posts evoke feelings of nostalgia. It is often that the best tool for the job is the one we already have, be it or something else. It won't replace though, but it doesn't make it less useful.

    Poništi
  17. A deeper look inside Google's open-domain architecture. Thanks . Impressive; not sure how many people I know would even pass the sensibleness-and-specificity metric, let alone a machine.

    Poništi
  18. 5. velj
    Poništi
  19. 5. velj

    A good way to get everybody on the same page is to describe the features of an application using the semi-structured language that everyone can understand. Thanks to

    Poništi
  20. 5. velj

    Think twice before pinning contact details to your social accounts. Twitter vulnerability potentially left millions of user's identities exposed, by allowing threat actors to match them with phone numbers.

    Poništi
  21. 5. velj

    Present employment is best aided by more hands-on experience, which will set you up for the next role as well, if not better than, any certificate. Be it , , or .

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·