SPONSOR AD This talk reframes how to manage secure access in a dev-friendly way using four principles: basing decisions on identity, making it easy to use, not trusting networks, and centralizing logging, with a practical application for SSH at the end. Live Webinar, December 10th, 2020 - Save Your Seat. |
Creating a successful chaos practice isn’t purely an engineering problem. As with many aspects of cloud native computing it requires buy-in across the organisation. Whilst many large organisations have seen considerable success with chaos, many others are yet to apply it, and may be unsure how to get started. In this eMag, we’ve pulled together a variety of case studies to show mechanisms by which you can do so, even in tightly regulated industries where you might face considerable opposition. (eMag) |
In this podcast, Michelle Noorali, senior software engineer at Microsoft, sat down with InfoQ podcast co-host Daniel Bryant. Topics discussed included: the service mesh interface (SMI) spec, the open service mesh (OSM) project, and the future of application development on Kubernetes. (Podcast) |
|
TOP AI, ML & Data Engineering NEWS HEADLINES |
-
|
In this article, author Greg Methvin discusses his experience implementing a distributed messaging platform based on Apache Pulsar. (Article) |
SPONSOR AD This practical guide introduces architecture for serving models in real time as part of input stream processing. Using Python, Beam, Flink, Spark, Kafka streams and Akka, you’ll learn different ways to build a model-scoring solution. Download now. |
|
|
TOP DevOps NEWS HEADLINES |
-
-
-
-
-
|
Modern systems are more complex to monitor as they tend to emit large amounts of high cardinality data. Recent innovations in open-source time series databases have improved the scalability of newer monitoring tools such as Prometheus. These solutions are able to handle the high scale of data while providing metric scraping, querying, and visualization based on Prometheus and Grafana. (Article) |
The panelists discuss observability, security, the software supply chain, CI/CD, chaos engineering, deployment techniques, canaries, and blue-green deployments all in the pursuit of production resiliency. (Presentation with transcript included) Level-up on the practices, patterns, and skills most in-demand in software right now. Attend QCon Plus (May 10 - 28, 2021). |
Jim Severino shares what worked (and didn't work) in incident management and post-mortems for Atlassian. (Presentation) |
Liz Fong-Jones discusses some of the manual experiments they ran at Honeycomb, the bugs discovered in some automatic replacement tools, and what steps they took for continuously running experiments. (Presentation) |
SPONSOR AD Read the latest IDC Innovators: Multicloud Networking report and discover one of the premier platforms addressing the rise of multicloud architectures and cloud-native apps. Download Free eBook. |
|
|
TOP Development NEWS HEADLINES |
-
-
-
-
|
This article will provide an overview of recent advancements in Quantum Computing on both the hardware and software fronts. Along the way we’ll share the results of our own research and development in this field. We will also sketch out some of the steps that organizations can take now to be “quantum ready.” (Article) |
WebAssembly can be used server-side to provide the performance required by use cases such as blockchains and edge AI services. Non-standard extensions may address those use cases today, possibly weakening WebAssembly portability benefits. The gathered experience may however provide important inputs to current and future WebAssembly proposals. (Article) |
SPONSOR AD In DevOps, dev teams are under pressure to deliver faster. Learn why it’s critical for your team to adopt shift-left testing methodologies, and how to implement it. Download now. |
|
|
A security researcher has identified 12 vulnerabilities that exploit Cisco Security Manager. The flaws include deserialization, remote code execution, and arbitrary file access. (News) |
SPONSOR AD See the latest research on container orchestration trends, microservices architecture, and Kubernetes deployment strategies. Read the Guide. |
|
|
TOP .NET NEWS HEADLINES |
-
-
-
-
|
In part two of our .NET 5 coverage, we take a look back at historic .NET technologies that never made the jump to .NET Core. What’s interesting about these technologies is their APIs were copied across, hinting that Microsoft was considering a .NET Core implementation of them in the future. (News) |
|
TOP Web Development NEWS HEADLINES |
-
|
Inertia.js allows developers to write single-page applications using classic server-side routing and controllers. Inertia tightly couples the backend to the frontend so developers need not write APIs. Developers can use battle-tested server-side frameworks (e.g., Laravel, Ruby on Rails, Django, AspNetCore). On the client, developers can use React, Svelte, or Vue to implement the user interface. (News) |
|
In case you missed it |
Research shows that there is an increasing demand for near real-time APIs, in which speed and flexibility of response are vitally important. This eMag explores this emerging trend in more detail. (eMag) |
SPONSOR AD Solve common serverless development issues with Knative, the first serverless platform natively designed for Kubernetes. Integrate applications, build container images from source, and more. Download Now. |
|
|
TOP Culture & Methods NEWS HEADLINES |
-
-
|
Doug Talbot discusses the confusion surrounding Product Ownership / Product Management. He provides some advice on tackling the complexity of creating your own contextualised and personalised product value stream for your organisation or team and using systems thinking and Cynefin for complexity. (Article) |
SPONSOR AD Karat and Harris Insights surveyed more than 300 engineering leaders about their hiring strategies before and during COVID-19. This report presents the findings and explores three key areas: how the ‘interview gap’ influences software engineering performance, the impact of COVID-19 on hiring, and how successful orgs are out-hiring competitors. Download now. |
|
The book The Power of Virtual Distance, 2nd edition, by Karen Sobel Lojeski and Richard Reilly, describes the Virtual Distance Model and provides data and insights from research that can be used to lower Virtual Distance when working remotely together. By doing so, organizations can see quantifiable improvements in both business goals and human well-being among employees. (Article) |
SPONSORED CONTENT Latest White Papers The Ultimate Guide to Kubernetes Security - Download the eBook Gaining Continuous Intelligence from Apache Kafka Event Streams Distributed Edge Computing for 100% Uptime |