Hi everyone, Welcome to issue #175.
Have you ever write defensive code and try to catch all the condition of the input and handle it gracefully? Here, Matt, creator of Envoy Proxy, think that just let it crash is a better method. The resulting crash and stack trace will be extremely obvious, easy to debug, and fix. It
Most of the time, you can probably get by fine not knowing anything about memory management as a JavaScript developer. Afterall, the JavaScript engine handles this for you. In this article, I introduce you to how memory allocation and garbage collection works and how you can avoid some common memory leaks.
The Paxos algorithm is notorious for how difficult it is to understand. I had to learn the Paxos algorithm in my distributed systems class. I even have “implemented” it by translating Leslie Lamport’s TLA+ to Python. But I didn’t understand it until much much later. Now I have a better understanding of Paxos than I used to, I want to explain it to other people.
a method allows an attacker to remotely access any TCP/UDP service bound to a victim machine, bypassing the victim’s NAT/firewall (arbitrary firewall pinhole control), just by the victim visiting a website.
BBC migrated an existing on-premise site to the cloud. Use new technolgies such as serverless. Hundreds of people have been involved, over several years. They talk about the approach we took to creating a new site that’s ready for the future. Delivering quality technology change, quickly and effectively.
Foreign keys are useful but they are a pain to use. You need to insert the data in right order. So how we’re going to figure out the order of relationship if we’re new to the data model? Here, the author wrote an extensive query that generate that magic order.
Pinterest uses Jenkins for their CI/CD. In Jenkins, when checking out a Git repository, you can optionally set RefSpec. They found out setting refspec increases speed on huge repo.
Have you ever gotten so frustrated while searching for an issue in your code that you tried something you know you already tried, just to see if it works this time? That is the point where a different strategy might work better
Imagine spending hours digging into an intermittent connectivity failure issue only to discover the problem had been caused by a sysctl flag that had been set to 0 in a naive attempt at optimization, when it should have been set to 1! Salesforce shares with us how they operates their complex k8s clusters.
Go package to generate and manage color palettes & schemes. Probably we rarely need to use this, but it’s good to know how to do it in Go
GoA tool for monitoring and provisioning (coming soon) network devices written in Go. It features a check mode which complies with the monitoring plugins development guidelines and is therefore compatible with Nagios, Icinga, Zabbix, Checkmk, etc.
A Grammar of Interactive Graphics
monitors Kubernetes, recording histories of events and resource state changes and providing visualizations to aid in debugging past events
Work with remote images registries - retrieving information, images, signing content. An example is How to use skopeo to migrate off Docker Hub
a mail retriever designed to allow you to get your mail from one or more mail accounts on various mail servers to your local machine for reading with a minimum of fuss.
BetterDev Link
Every Monday