en.wikipedia.org/wiki/Cyrilli...
en.wikipedia.org/wiki/Cyrilli...
If I have a pod with NET_ADMIN capability, and the default pod network namespace, and it gets compromised, what's the worst it can do?
I am interested in this question specifically, not general advice.
If I have a pod with NET_ADMIN capability, and the default pod network namespace, and it gets compromised, what's the worst it can do?
I am interested in this question specifically, not general advice.
🔹 On the server side, we need to compute requests per second and application load.
🔹 On the client side, enable weight-based request distribution.
It was not exactly five minutes to figure out, though
🔹 On the server side, we need to compute requests per second and application load.
🔹 On the client side, enable weight-based request distribution.
It was not exactly five minutes to figure out, though
- IRC (Internet Relay Chat) was used
- All messages were deleted after 2 weeks
I still believe that is the best way, and all the modern Slacks with years of history are only good for Slack's valuation.
- IRC (Internet Relay Chat) was used
- All messages were deleted after 2 weeks
I still believe that is the best way, and all the modern Slacks with years of history are only good for Slack's valuation.
It has two Xeon 8488C processors, each with 48 cores.
Each procesor has 4 silicon dies.
Each die has 15 cores.
I assume that 48 cores, and not 60, is the result of binning.
This is a very heterogeneous architecture.
It has two Xeon 8488C processors, each with 48 cores.
Each procesor has 4 silicon dies.
Each die has 15 cores.
I assume that 48 cores, and not 60, is the result of binning.
This is a very heterogeneous architecture.
The Go client can do weighted round-robin with xDS, but xDS requires Istio, and I'd rather not.
The Go client also supports custom load balancing policies, but that's very DIY.
Does anybody have practical recommendations?
The Go client can do weighted round-robin with xDS, but xDS requires Istio, and I'd rather not.
The Go client also supports custom load balancing policies, but that's very DIY.
Does anybody have practical recommendations?
- Many services have triggers, e.g. I can have S3 trigger invoking Lambda.
- There is SQS that I can use any way I like
Surely, if any service could write to SQS, we would not need yet another service?
- Many services have triggers, e.g. I can have S3 trigger invoking Lambda.
- There is SQS that I can use any way I like
Surely, if any service could write to SQS, we would not need yet another service?
Kimball was it. However, it requires many joins and it's not perfect for big data on S3. The methodology itself might be overkill in most cases.
Do we have anything now beyond "use wide tables" and "scd2 if needed"?
Kimball was it. However, it requires many joins and it's not perfect for big data on S3. The methodology itself might be overkill in most cases.
Do we have anything now beyond "use wide tables" and "scd2 if needed"?
Is this just my bubble, or has PostgreSQL decisively won over MySQL?
Is this just my bubble, or has PostgreSQL decisively won over MySQL?
Spoiler: it does the job in easy cases, but for full-blown deployment, you will need to write your own automation.
vladimirprus.com/blog/2025-01...
Spoiler: it does the job in easy cases, but for full-blown deployment, you will need to write your own automation.
vladimirprus.com/blog/2025-01...
Generally, you have to either draw diagnostic charts for linear regression, or check the confidence intervals for coefficients, or both.
Generally, you have to either draw diagnostic charts for linear regression, or check the confidence intervals for coefficients, or both.
There's one benchmark, called "RULER", which claims the effective context size is ">128K", which is still fairly impressive.
There's one benchmark, called "RULER", which claims the effective context size is ">128K", which is still fairly impressive.
It is generally best not to do your own auth. Now that AWS ALB has built-in OAuth support, you can completely off-load authentication, with your service receiving only requests from known users.
vladimirprus.com/blog/2024-11...
It is generally best not to do your own auth. Now that AWS ALB has built-in OAuth support, you can completely off-load authentication, with your service receiving only requests from known users.
vladimirprus.com/blog/2024-11...
In this post, my colleague Sergey Kotlov explains when it is useful, how to make it work in practice, and what challenges you might find.
towardsdatascience.com/adopting-spa...
In this post, my colleague Sergey Kotlov explains when it is useful, how to make it work in practice, and what challenges you might find.
towardsdatascience.com/adopting-spa...
Previously, I worked on developer tools such as GDB, Eclipse, and KDevelop.
Hopefully, this platform will be a good one for technical content.
Previously, I worked on developer tools such as GDB, Eclipse, and KDevelop.
Hopefully, this platform will be a good one for technical content.