Given the petabyte scale size and criticality of data, we need a robust and efficient backup and restore solution. We drastically reduced our Recovery Time Objective (RTO) to under 30 minutes by redesigning our tooling to use disk-based snapshots, and we want to share how it was done
Insights on how we manage 140+ Kubernetes clusters on AWS at Zalando for 200+ developers.
Playing with a simple bean machine illustrates how deterministic laws can produce probabilistic, random-seeming behavior.
I have a set of keys and values. I also have some servers for a key-value store. This could be memcached, Redis, MySQL, whatever. I want to distribute the keys across the servers so I can find them again. And I want to do this without having to store a global directoy.
When we created our bulk data arrays, we assumed that all objects were fixed size so that we could fit their data into a single struct and store the bulk data as just an array of such structs: But what if we need some fields in the object that are dynamically sized?
building a tiny virtual machine manager (VMM) and a super tiny “operating system” to understand how KVM really works?
Could you turn the curl manual page into a game? This is a technical write up of the infrastructure behind this game which require a new VM per user per game.
Lots of productivity hack and tips around Linux, Docker, SSH, Bash….
Push and pull git repos to/from an s3 bucket, encrypted using gpg. You will learn how to create custom git command.Rust
An instance of your terminal in your browserPython
A serverless cluster computing system for the Go programming language
🐒 Resiliency toolkit for Ruby for failing fastRuby
A high-performance color highlighter for Neovim which has no external dependencies!Lua
Learn about ftrace: instrument all kernel functions almost instantly, and with low overhead?
Another good one on CSS topic is https://hacks.mozilla.org/2019/10/faster-layouts-with-css-grid-and-subgrid/)
Open source data dashboarding. a free alternative to expensive SaaS tools like PeriScope, Mode, Looker or ChartIO
Tools to bootstrap CAs, certificate requests, and signed certificates.
IAM Least Privilege Policy Generator
An event-driven, portable runtime for building microservices on cloud and edge
Comment system alternative to disques
an archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Its aim is to serve as the most comprehensive collection of exploits, shellcode and papers gathered through direct submissions, mailing lists, and other public sources, and present them in a freely-available and easy-to-navigate database
A command-line benchmarking tool
Better Dev Link