Welcome to curated list of handpicked free online resources related to IT, cloud, Big Data, programming languages, Devops. Fresh news and community maintained list of links updated daily. Like what you see? [ Join our newsletter ]

Rings of an ancient tree contain a record of Earth's magnetic field reversal

Categories

Tags miscellaneous big-data data-science learning

An ancient Agathis australis tree with rings that document the near-reversal of Earth’s magnetic field has been discovered on New Zealand’s north island. The tree, which measures 8 feet in diameter and 65 feet in length, was found buried under 26 feet of soil. Carbon dating shows that the tree was alive for 1,500 years and lived between 41,000 and 42,500 years ago. By @ilovetheuniverse.com.

The tree’s rings show a complete record of the near-reversal of Earth’s magnetic field. This is the first time that a tree documenting the full event has ever been found. Reversals in our planet’s magnetic field have been linked to extinction events. Scientists studying the tree say that it provides insight into what we might expect the next time we experience a reversal of Earth’s magnetic field.

NASA warned earlier this year that the magnetic “north pole” is speeding toward Russia at 30 miles per year, indicating the start of a total pole reversal. While it can take thousands of years for the poles to completely flip, their journey to the other side can cause chaos in the meantime, as the magnetic field lines cross and become jumbled, weakening their ability to protect us from solar radiation.

Scientists are scrambling to develop models to determine how that will look in practice. This tree will assist them in doing so. Super interesting!

[Read More]

Concurrency in Go-2(Go Channels)

Categories

Tags app-development programming golang performance

The channel acts as a pipe by which we send typed values from one Goroutine to another. It guarantees synchronization since only one Goroutine has access to a data item at any given time. The ownership of the data is passed between different Goroutine. By Neeraj Kumar.

Concurrency in Go-2(Go Channels

Source: https://dev.to/neeraj1997dev/concurrency-in-go-2go-channels-24lk

In this guide you will learn:

  • Why use channels in golang?
  • Creating a Go channel
  • Steps to create a channel in Go
  • Directional channel in Go
  • Go channel use cases
  • Use of range in Go channels
  • Select statement in Go channels
  • Fan in and fan out in golang channel

… and much more. Code examples thoroughly explain the concept. In Go, channels are essential for communication between goroutines. Channels support bidirectional communication i.e sending and receiving values on the same channel. This mechanism enables goroutines to synchronize without experiencing any deadlock. Nice one!

[Read More]

How to balance virtual machine traffic with Kubernetes services

Categories

Tags devops microservices app-development kubernetes

Kubernetes service constructs create highly available services in mixed container and VM environments without any external components. By Fatih Nar (Navigator, Red Hat), Rimma Iontel (Red Hat).

OpenShift supports the best of both virtualization worlds: virtual machines (VMs) and containers. In the containers and Kubernetes world, the “services” model permits external access to and consumption of applications that are deployed as containers within the pods.

In the article you will find:

  • How OpenShift creates VMs
  • Implement load balancing with multiple VMs
  • Test VM traffic
  • Create highly available services

You can leverage Kubernetes service constructs to create highly available services in a mixed container and VM environment, and you can do it without the need for any external components. This approach can be very handy in small-footprint and edge deployments where container and VM workloads coexist. Good read!

[Read More]

Asynchronous tasks with Flask and Celery

Categories

Tags python web-development app-development

If a long-running process is part of your application’s workflow, rather than blocking the response, you should handle it in the background, outside the normal request/response flow. By Michael Herman.

By the end of this tutorial, you will be able to:

  • Integrate Celery into a Flask app and create tasks.
  • Containerize Flask, Celery, and Redis with Docker.
  • Run processes in the background with a separate worker process.
  • Save Celery logs to a file.
  • Set up Flower to monitor and administer Celery jobs and workers.
  • Test a Celery task with both unit and integration tests.

Perhaps your web application requires users to submit a thumbnail (which will probably need to be re-sized) and confirm their email when they register. If your application processed the image and sent a confirmation email directly in the request handler, then the end user would have to wait unnecessarily for them both to finish processing before the page loads or updates. Instead, you’ll want to pass these processes off to a task queue and let a separate worker process deal with it, so you can immediately send a response back to the client. Nice one!

[Read More]

Exploring the JWT attacks landscape

Categories

Tags infosec devops web-development app-development

Due to its popularity, JWT attacks are one of of the most exploited vulnerability by attackers. Each JWT contains base64 encoded JSON objects. By Aamir Ahmed.

A cryptographic algorithm is used to sign JWT tokens to ensure the token’s integrity and protect against JWT attacks. The article further deals with:

  • JWT structure
  • JWT attacks in the wild
    • Change to ‘NONE’
    • JWT token expiration
    • HMAC algorithm
    • Brute-forcing JWT token
    • Improper signature verification
    • Automate it all
    • Directory traversal
    • SQL Injection
    • JKU header tampering

HMAC and RSA are two most common algorithms used in JWT . HMAC works on the principle of symmetric encryption while RSA used assymetric encryption. To preserve integrity, the secrecy of secret key in HMAC and private key in RSA must be maintained. Good read!

[Read More]

How to fix and debug Docker Containers like a superhero

Categories

Tags devops containers cloud docker

While containers help developers rapidly build and run cross-platform applications, creating error-free apps remains a constant challenge. And while it’s not always obvious how container errors occur, this mystery is even harder for newer developers to unravel. Figuring out how to debug Docker containers can seem daunting. By Tyler Charboneau.

In this community all-hands session, Ákos Takács demonstrated how to solve many of these pesky problems and gain the superpower of fixing containers. He covers finding and fixing common container mistakes:

  • Using the CLI for extra container visibility
    • Change your CLI output formatting for visibility and readability
  • Remember to leverage your logs
  • Tackle issues with ENTRYPOINT
  • Access and inspect container content
    • Dive deeply into files and folders
  • Solve Docker Build errors
  • Solve Docker Compose errors
  • Optional: Make direct file edits within running containers
  • Investigate less and develop more

Overall, the process of fixing a container, on the surface, may seem daunting to newer Docker users. The methods we’ve highlighted above can dramatically reduce that troubleshooting complexity — saving you time and effort. You can spend less time investigating issues and more time creating the applications users love. And we think those skills are pretty heroic. Nice one!

[Read More]

What is a Web3 browser and how does it work?

Categories

Tags browsers miscellaneous crypto infosec

Web3 browsers like Brave allow users to access DApps, integrate cryptocurrencies and surf over the decentralized web with greater privacy and security. The phrase “Web3” is used to characterize multiple evolutions of web interaction and usage along various paths, including creating a geospatial web, utilizing artificial intelligence tools and making content available through numerous non-browser apps or Web3 browsers. By Onkar Singh.

This article will discuss Web3 fundamentals, key features of a Web3 browser, how a Web3 browser works and how to use one:

  • What is a Web3 browser?
  • How does a Web3 browser work?
  • How to use a Web3 browser?
  • Opera Web3 browser
  • Opera Web3 browser
  • Brave Web3 browser
  • Beaker browser
  • The future of Web3 browsers

Shift towards decentralized web calls for novel and innovative solutions to enhance the user experience, and Web3 browsers acting as a gateway to DApps are essential to access the digital economy. Interesting read!

[Read More]

What are 4 golden signals for monitoring Kubernetes?

Categories

Tags devops kubernetes infosec app-development

Golden Signals are the meaningful data insights that we use for monitoring and observability of a system. They are the signals vs. noise that can help guide us towards what’s affecting the health of the environment. By Roland Wolters.

The main content you find in the article:

  • Signal vs. Noise
  • Golden Signals for Kubernetes Ops
  • Golden Signals and Kubernetes observability
  • Why is Observability in Kubernetes a multi-dimensional challenge?
  • The eBPF advantage for observability in Kubernetes
  • What can you do with observability and golden signals in Kubernetes?
  • Observability and Kubernetes beyond troubleshooting

Why does Kubernetes present challenges with finding the right signals? Kubernetes gives us a common level of abstraction so that developers can just deploy applications without needing to know everything about the underlying infrastructure. The same wondrous abstraction makes it complex and noisy to monitor what’s actually happening in the Kubernetes environment that is affecting our application.

The 4 golden signals for monitoring Kubernetes – latency, traffic, errors, and saturation – give us a broad coverage of important metrics from which we can derive the state of the environment, including health and utilization. Using eBPF for observability gives the deep insights without the resource overhead and operational complexity of agent-based, traditional, legacy monitoring tools. Nice one!

[Read More]

Optimizing Apache JVMs for Apache Kafka

Categories

Tags performance programming jvm java

Java Virtual Machines (JVMs) impact Apache Kafka® performance in production. How can you optimize your event-streaming architectures so they process more Kafka messages using the same number of JVMs? Podcast by confluent.io.

Gil Tene (CTO and Co-Founder, Azul) delves into JVM internals and how developers and architects can use Java and optimized JVMs to make real-time data pipelines more performant and more cost effective, with use cases.

Improvements in JVMs aren’t yielded with a single stroke or in one day, but are rather the result of many smaller incremental optimizations over time, i.e. “half-percent” improvements that accumulate. Improving a JVM starts with a good engineering team, one that has thought significantly about how to make JVMs better. The team must continuously monitor metrics, and Gil mentions that his team tests optimizations against 400-500 different workloads (one of his favorite things to get into the lab is a new customer’s workload). Good listen!

[Read More]

Azure PostgreSQL Flexible Server exciting new backup and restore enhancements

Categories

Tags database azure sql devops

Backup and restore are key pillars for business continuity and disaster recovery offerings for Azure Database for PostgreSQL Flexible Server. We’re excited to announce new features including Fast Restore, Geo Restore and Custom Restore Points to allow you more fine-grained control on your DR plan to achieve the RPO and RTO objectives. In this post we’ll share an overview of each of these new features. By Varun Dhawan.

The main points mentioned:

  • Fast restore
  • Geo backups and restore
  • Backups and restore blade

Point-in-time restore (PITR) is critical for disaster recovery by allowing recovery from accidental database deletion and data corruption scenarios. Today, PostgreSQL Flexible server performs automatic snapshot backups and allows restoring to latest point or a custom restore point. The estimated time to recover is heavily dependent on the size of transactions logs (WAL) that need to be replayed at the time of recovery. Without having much visibility into the last full backup time, it was never easy to predict the amount of time it takes to restore. Good read!

[Read More]