ContentPosts from @faun..
Link
@faun shared a link, 1 year, 3 months ago

Redis is forked

Redis has played a significant role in many developers' work on high-scale, low-latency web services for the past fifteen years. It is a reliable and efficient tool that empowers developers and handles high throughput with low latency, making it a go-to choice in the industry. The recent licensing c..

Redis is forked
Link
@faun shared a link, 1 year, 3 months ago

Transitioning to OpenTelemetry

In this guest blog, Einar NorðfjÜrð walks through Birdie's journey moving from logs to OpenTelemetry and Honeycomb's tracing...

Transitioning to OpenTelemetry
Link
@faun shared a link, 1 year, 3 months ago

The Scary Thing About Automating Deploys

Most of Slack runs on a monolithic service called "The Webapp" with hundreds of developers making hundreds of changes weekly. Deploying at this scale poses a unique challenge, especially in implementing continuous deployment. Slack deploys from its Webapp repository 30-40 times a day to its producti..

The Scary Thing About Automating Deploys
Link
@faun shared a link, 1 year, 3 months ago

Kubernetes v1.30: Uwubernetes

Kubernetes v1.30 introduces new stable, beta, and alpha features with 45 enhancements, including 17 stable, 18 in beta, and 10 in alpha. The release theme and logo for Kubernetes v1.30 is Uwubernetes. Some of the improvements that graduated to stable include volume manager refactoring, pod schedulin..

Kubernetes v1.30: Uwubernetes
Link
@faun shared a link, 1 year, 3 months ago

We discovered an AWS access vulnerability

AWS IAM was used extensively by Stedi to enforce role-based access control for customers. A vulnerability was discovered in AWS STS where role trust policy statements were evaluated incorrectly, allowing unauthorized access to AWS accounts. Stedi shared their discovery process and collaboration with..

We discovered an AWS access vulnerability
Link
@faun shared a link, 1 year, 3 months ago

State of DevSecOps

An analysis of security posture across a range of applications written in various programming languages found that Java services are disproportionately affected by vulnerabilities, with a high percentage of services vulnerable to critical, high-severity issues introduced by third-party libraries. Vu..

State of DevSecOps
Link
@faun shared a link, 1 year, 3 months ago

How to Build a Data Center in 5 Steps

Establishing internal network infrastructure: Configuring a robust internal network infrastructure is key to efficient data center operations. This involves setting up switches, routers, and firewalls to manage data flow and protect against intrusions. Redundancy is critical for ensuring high availa..

How to Build a Data Center in 5 Steps
Link
@faun shared a link, 1 year, 3 months ago

Why Fugaku, Japan’s fastest supercomputer, went virtual on AWS

The supercomputer Fugaku, developed by Japan's RIKEN Center for Computational Science, is now available on the Amazon Web Services (AWS) Cloud for easier access. Fugaku has been used for various societal needs, from COVID-19 simulations to drug discovery and economic forecasting...

Why Fugaku, Japan’s fastest supercomputer, went virtual on AWS
Link
@faun shared a link, 1 year, 3 months ago

How I Tripped Over the Debian Weak Keys Vulnerability

Next month will mark the 16th anniversary of the disclosure of a major vulnerability in the Debian OpenSSL package that resulted in predictable private keys. In 2008, a solution was implemented at Engine Yard to address slow SSH login times for GitHub users, involving patching OpenSSH to lookup keys..

Link
@faun shared a link, 1 year, 3 months ago

Stop going to the cloud and getting scammed

$200 infra to serve your startup till 100k monthly users in 15 minutes. Self-hosted Postgres, caddyserver and docker-compose FTW...

Stop going to the cloud and getting scammed