Boring Is Beautiful
I for one am looking forward to the day when Kubernetes becomes as boring for businesses as physical infrastructure. #k8s
It is an incredible foundation but there is more to life than yaml.
Computer says, “No”. The Apple App Store strikes again.
New Blog Post: Install your own WireGuard VPN, the most stable VPN I’ve used to date.
“The only reason to adopt microservices is if you will inevitably ship your org chart.”
I enjoyed this talk by Ben Sigelman on the lessons he’s learned from being exposed to microservices. Keeping your dashboards simple as the number of services increases takes both understanding and effort.
“The problem with these tests is twofold. First, parents are testing their children in ways that could have serious implications as they grow older — and they are not old enough to consent. Second, by sharing their children’s genetic information on public websites, parents are forever exposing their personal health data.”
If you’ve ever wondered how Change Data Capture might be implemented, this is an excellent blog post by the Netflix Engineering team that explains how they’ve implemented DBLog, an open source CDC tool.
I particularly like the use of the low and high watermarks to ensure the contents of a dump don’t overwrite more up to date entries from the transaction log.
The headline says Google today but until corporates are heels accountable for something other than profit these stories will continue. It’s difficult to see where this accountability will come from.
> “Is it the inevitable outcome of a corporate culture that rewards growth and profits over social impact and responsibility?”
“Ten years of social media have left us all worse off.” – ft.com
There is so much more that could be said about the way we’ve allowed social media to shape the last decade; speed over accuracy, the role of the algorithmic feed, the amplification of minority views, the lack of accountability, the abuse...
The more I read about these large scale security breaches, the more I think security is an underrated field of work. Too often the real challenges are lost in efforts to guarantee security through poorly fitting checklists and process.
https://www.wsj.com/articles/ghosts-in-the-clouds-inside-chinas-major-corporate-hack-11577729061 Ghosts in the Clouds: Inside China's Major Corporate Hack - Wall Street Journal
Server-Timing Client-Side: Augment the DevTools network timing charts with server-side timing information.
> "A lack of awareness of security seems to lead to a lack of prioritization of tasks that don’t directly support bringing the product to launch. The market seems to have made it more important to launch a usable product than a secure one, with the prevailing attitude being, “we can do the security stuff later.”
What do Facebook, China and Apple have in common? It’s not technology…
They’ve all been the subject of discussion on an incredible run of episodes on The Exponent podcast by Ben Thompson and James Allworth. Highly recommend.
If you are on the journey to micro-services, you could do worse than put some thought into understanding dependencies between your system components.
All too often it’s the pager that alerts teams to the increased complexity and fragility of managing inter-service dependencies at runtime.
The mysterious case of macOS Terminal ignoring folders in the PATH variable. Or how the Catalina upgrade broke copy/paste in Vim.