// getcortexapp.com
There are a lot of SRE tools out there, and it can be hard to know which ones are the most important to consider. Cortex compiled this guide to highlight the key categories of SRE tools and help you find the right fit for your team.
// lozanomatheus.com
It’s basically having multiple accounts for specific goals, could be per team, per environment, per project. There are a lot of good things you’ll get by following this best-practice, like centralized management (consolidated billing, accounts, etc), define policies per account or Organizational Unit (like audit/log is mandatory, tag policy, MFA is mandatory, etc) and many other things.
// hiringengineersbook.com
If you’re in a management position, you need to realize that development is mainly decision making, which of course only works if you’re given the necessary autonomy to make those decisions. I believe this realization is one of the main reasons many successful companies have a better engineering culture.
// calpaterson.com
To estimate what the theoretical best physical place to put his own server, Cal Paterson combined publicly publicly available data on latencies with his own web server accesslogs.
// hugoreeves.com
Martin explains there are several different understandings of what Event-Driven Architecture is. All of these are valid but are distinct in their actual form. Martin delves into four of these.
// blog.container-solutions.com
Design Thinking is a method for getting solutions to problems that really work for the people you’re designing for. Applying it gives you more focus on the real problem, more understanding of the people involved, and ideas that really work.
// jdsupra.com
Are hashed passwords secure? Or, perhaps more importantly from a legal perspective, does an unauthorized person having access to a username/email address and an accompanying hashed password “permit access to an online account?”
// arstechnica.com
Canonical released Ubuntu Core 20 this week. Ubuntu Core relies almost entirely on Canonical's relatively new snap package format which attempts to make everything a container.
// threatpost.com
While Hildegard, initially detected in January 2021, is initially being used to launch cryptojacking operations, researchers believe that the campaign may still be in the reconnaissance and weaponization stage. Eventually, they warn, TeamTNT may launch a more large-scale cryptojacking attack via Kubernetes environments or steal data from applications running in Kubernetes clusters.