2025

article thumbnail

Incident Update: Docker Desktop for MacĀ 

Docker Blog

We want to inform you about a new issue affecting Docker Desktop for some macOS users. This causes Docker Desktop to not start. Some users may also have received malware warnings. Those warnings are inaccurate. Current status We have identified the root cause. A temporary workaround that will restore functionality is available for any affected users.

363
363
article thumbnail

EP146: The Open Source AI Stack

ByteByteGo

This week’s system design refresher: API Vs SDK! What's the difference? (Youtube video) The Open Source AI Stack Cookies Vs Sessions Vs JWT Vs PASETO Algorithms you should know before taking System Design Interviews Top 6 Load Balancing Algorithms How TikTok Manages a 200K File Frontend MonoRepo? SPONSOR US API Vs SDK! What's the difference? The Open Source AI Stack You don’t need to spend a fortune to build an AI application.

Cookie 312
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Wall of Technical Debt

Mathias Verraes

Technical debt is a metaphor for all software design choices that turn out to be suboptimal, no longer valid, or just plain wrong. These choices incur a cost on future development, and the shortcuts taken today will later slow you down until you pay back the debt by fixing the problems. And its not only code: Artifacts like architecture, documentation, tests, and domain models can all suffer from technical debt.

Financial 245
article thumbnail

Protecting AI so AI Can Improve the World, Safely

Cisco Wireless

You need to move fast with AI, but you absolutely cannot afford to sacrifice safety and security for speed. Announcing Cisco AI Defensea solution designed to eliminate this tradeoff and empower you to innovate fearlessly.

Network 145
article thumbnail

High Volume Email in Exchange Online: A Comprehensive Guide

Faris Malaeb

For businesses that need to send a significant number of emailswhether for marketing campaigns, transactional notifications, or internal alertsMicrosoft offers a specialized feature known as High Volume Email (HVE). This feature allows organizations to surpass standard sending limits, ensuring smooth operations for high-demand scenarios. In this blog post, we will explore High Volume Email in.

Email 147
article thumbnail

Automated Accessibility Testing at Slack

Slack Engineering

At Slack, customer love is our first priority and accessibility is a core tenet of customer trust. We have our own Slack Accessibility Standards that product teams follow to guarantee their features are compliant with Web Content Accessibility Guidelines (WCAG). Our dedicated accessibility team supports developers in following these guidelines throughout the development process.

137
137
article thumbnail

Multi-Path TCP: revolutionizing connectivity, one path at a time

CloudFaire

The Internet is designed to provide multiple paths between two endpoints. Attempts to exploit multi-path opportunities are almost as old as the Internet, culminating in RFCs documenting some of the challenges. Still, today, virtually all end-to-end communication uses only one available path at a time. Why? It turns out that in multi-path setups, even the smallest differences between paths can harm the connection quality due to packet reordering and other issues.

TCP 137

More Trending

article thumbnail

Enterprise Architects: From Cartographers to Scouts

Architect Elevator

Check the map, and then go have a look for yourself.

131
131
article thumbnail

Arctera named a Leader in Gartner Magic Quadrant

DCNN Magazine

Arctera (Veritas Technologies), a data management expert and formerly part of Veritas, has been positioned as a Leader in the inaugural Gartner Magic Quadrant for Digital Communications Governance and Archiving Solutions (DCGA). The reports publication comes shortly after Arctera announced it will put renewed focus on its Data Compliance InfoScale and Backup Exec businesses, following its split from Veritas.

article thumbnail

TVS Supply Chain Solutions built a file transfer platform using AWS Transfer Family for AS2 for B2B collaboration

AWS Architecture

TVS Supply Chain Solutions (TVS SCS) , promoted by the erstwhile TVS Group and now part of the $3 billion TVS Mobility Group, is an India-based multinational company who pioneered the development of the supply chain solutions market in India. For the last 2 decades, it has provided supply chain management services to customers in the automotive, consumer goods, defense, and utility sectors in India, the United Kingdom, Europe, and the US.

B2B 119
article thumbnail

How to Set Up a Kubernetes Cluster on Docker Desktop

Docker Blog

Kubernetes is an open source platform for automating the deployment, scaling, and management of containerized applications across clusters of machines. It’s become the go-to solution for orchestrating containers in production environments. But if you’re developing or testing locally, setting up a full Kubernetes cluster can be complex. That’s where Docker Desktop comes in it lets you run Kubernetes directly on your local machine, making it easy to test microservices, CI/CD pip

article thumbnail

How Uber Unified Checkouts Across Billion-Dollar Business Lines

ByteByteGo

Disclaimer: The details in this post have been derived from the Uber Engineering Blog. All credit for the technical details goes to the Uber engineering team. The links to the original articles are present in the references section at the end of the post. We’ve attempted to analyze the details and provide our input about them. If you find any inaccuracies or omissions, please leave a comment, and we will do our best to fix them.

article thumbnail

ā€œSoftware design is just theoryā€

Mathias Verraes

Software design is just theory. Design patterns are too academic. Writing code is the only way to become a better programmer. Just ship it. Thats over-designed. As a consultant, I visit different clients throughout Europe. Some of them hire me for help with greenfield projects. Some others want my help with legacy projects, that they have been working on for typically 4-6 years.

245
245
article thumbnail

Cisco AI Defense: Comprehensive Security for Enterprise AI Adoption

Cisco Wireless

Cisco AI Defense is a single, end-to-end solution that helps your organization understand and mitigate risk on both the user and application levels.

article thumbnail

PowerShell 101: Creating a Real-World Module: Scaffolding Functions

ATA Learning

Learn how to create powerful PowerShell modules from scratch by building a computer inventory tool. Perfect for sysadmins who need custom automation solutions.

115
115
article thumbnail

Hedge 254: Should you /64?

Rule 11

One of the big questions about IPv6 is: “Should you use /64’s for subnets?” Tom Coffeen joins Eyvonne Sharp, Rick Graziani, and Russ as we discuss the various questions surrounding IPv6 addressing, planning, waste, and … should you /64? [link] download One of the big questions about IPv6 is: "Should you use /64's for subnets?

116
116
article thumbnail

Open source all the way down: Upgrading our developer documentation

CloudFaire

At Cloudflare, we treat developer content like a product , where we take the user and their feedback into consideration. We are constantly iterating, testing, analyzing, and refining content. Inspired by agile practices, treating developer content like an open source product means we approach our documentation the same way an open source software project is created and maintained.

article thumbnail

Article: Being Functionless: How to Develop a Serverless Mindset to Write Less Code!

InfoQ Articles

Innovative cloud architect focusing on serverless computing and Function as a Service. Advocates for optimized, functionless architecture to reduce complexity and costs. Expertise in leveraging cloud-native services for sustainable operations and minimizing code liabilities. Committed to transforming engineering mindsets for efficient application development in a rapidly evolving tech landscape.

Cloud 112
article thumbnail

Cato CTRL Threat Research: Unmasking Hellcat ā€“ Not Your Average Ransomware Gang

CATO Networks

Executive Summary Theres a new ransomware gang targeting critical infrastructure, government organizations, educational institutions, and energy sectors. Their name? Hellcat. But who exactly are they? Hellcat is a new ransomware gang that has surfaced across dark web forums in 2024. Hellcat employs a ransomware-as-a-service (RaaS) model, offering ransomware tools and infrastructure to affiliates in exchange for a share of the profits.

Energy 106
article thumbnail

Global data centre demand surges despite constraints

DCNN Magazine

Artificial intelligence applications are rapidly expanding across industries, and the global data centre industry plays a critical role in AI adoption and advancement. To meet the exponential data centre demand, the sector will grow at a phenomenal pace in 2025. JLLs 2025 Global Data Center Outlook explores how AI is not only driving demand but the development of more powerful and efficient data centre infrastructure that balances computing power and sustainability.

Energy 111
article thumbnail

ILA Evo: Metaā€™s journey to reimagine fiber optic in-line amplifier sites

Engineering at Meta

Today’s rapidly evolving landscape of use cases that demand highly performant and efficient network infrastructure is placing new emphasis on how in-line amplifiers (ILAs) are designed and deployed. Metas ILA Evo effort seeks to reimagine how an ILA site could be deployed to improve speed and cost while making a step function improvement in power efficiency.

article thumbnail

Mastering Docker and Jenkins: Build Robust CI/CD Pipelines Efficiently

Docker Blog

Hey there, fellow engineers and tech enthusiasts! Im excited to share one of my favorite strategies for modern software delivery: combining Docker and Jenkins to power up your CI/CD pipelines. Throughout my career as a Senior DevOps Engineer and Docker Captain, Ive found that these two tools can drastically streamline releases, reduce environment-related headaches, and give teams the confidence they need to ship faster.

Server 308
article thumbnail

From Monolith to Microservices: Key Transition Patterns

ByteByteGo

Monolithic architecture is a software development approach in which the entire application is built as a single, unified codebase. It is often the simplest way to develop and deploy software. For small teams or projects, monoliths provide simplicity, fast development, and easy deployment. However, as the application grows, this simplicity becomes a double-edged sword, introducing several challenges such as: Scalability Bottlenecks : The entire application is scaled as a single unit in a monolith

article thumbnail

DRY is about Knowledge

Mathias Verraes

Have a look at these two classes: products )) { throw new Exception ( "Max 3 products allowed" ); } $this -> products [] = $product ; } } final class Shipment { private $products ; public function addProduct ( $product ) { if ( 3 == count ( $this -> products )) { throw new Exception ( "Max 3 products allowed" ); } $this -> products [] = $product ; } } Would you say this is duplicate code?

236
236
article thumbnail

Marketing Velocity Central Toolkit: Empowering Partners to Save Time and Money

Cisco Wireless

Discover Marketing Velocity Learning: Empowering partners with essential tools and bite-sized courses for seamless co-marketing campaigns, personalized learning paths, and efficient asset customizationaligning with Cisco's strategy for impactful results.

133
133
article thumbnail

IRP v4.2.7 has arrived: Enhanced Inbound Performance Optimization & Prefix-List-Based Statistical Models

Noction

The latest Intelligent Routing Platform v4.2.7 has just been released. This update includes significant improvements to Inbound Performance Optimization, refined reporting, and expanded IPv6 support. Each feature is designed to deliver better network performance and improved usability. Below are the key updates included in this release.

article thumbnail

PowerShell Pester 101: A Practical Guide for Beginners

ATA Learning

Learn how to validate your PowerShell scripts with Pester testing. This hands-on guide shows you how to write tests that ensure your code works as intended.

106
106
article thumbnail

Hedge 255: Open Multi-perspective Issuance

Rule 11

One of the various attack surfaces in encryption is insuring the certificates used to share the initial set of private keys are not somehow replaced by an attacker. In systems where a single server or source is used to get the initial certificates, however, it is fairly easy for an attacker to hijack the certificate distribution process. Henry Birge-Lee joins us on this episode of the Hedge to talk about extensions to existing certificate systems where a certificate is pulled from more than one

article thumbnail

HN764: Should You Pursue a Technical Leadership Role?

Packet Pushers

Do you think you have what it takes to be a manager? Should you go for it? Laura Santamaria, host of the Technically Leadership podcast, joins Ethan Banks to discuss those questions. They talk about the motivations for moving into a management role, the challenges of managing people, and the need to understand the business. Read more » Do you think you have what it takes to be a manager?

Banking 98
article thumbnail

Cato CTRL Threat Brief: CVE-2024-49112 and CVE-2024-49113 ā€“ Windows LDAP Vulnerabilities (ā€œLDAPBleedā€ and ā€œLDAPNightmareā€)Ā 

CATO Networks

Executive Summary In a world where dozens of CVEs are released every day, there are vulnerabilities, and there are vulnerabilities. The latest Microsoft Windows LDAP (Lightweight Directory Access Protocol) vulnerabilities, which were coined not once but twice ( LDAPBleed and LDAPNightmare), clearly belong to the shortlist of new and dangerous CVEs.

Server 111
article thumbnail

SiTime product launch boosts efficiency of AI data centres

DCNN Magazine

SiTime Corporation , a precision timing company, has announced the differential-ended SiT5977 Super-TCXO, the newest member of the SiTime Elite RF family. The company states that this is the only single-chip timing product that delivers the most resilient performance for AI compute-nodes with high bandwidth and network synchronisation. Applications include smart network interface cards (Smart NICs), acceleration cards, switches and compute nodes in the $200 billion data centre infrastructure mar

Energy 109
article thumbnail

Improved and Expanded ELA Courses for Grades 7ā€“10!

Khan Academy

We are excited to announce that weve added a slew of new resources to our standards-aligned middle school and high school English Language Arts (ELA) courses. These improved and expanded courses provide comprehensive support for mastering reading and vocabulary skills through engaging multimedia resources, including videos, articles, and interactive exercises.

article thumbnail

How to Dockerize a Django App: Step-by-Step Guide for Beginners

Docker Blog

One of the best ways to make sure your web apps work well in different environments is to containerize them. Containe rs let you work in a more controlled way, which makes development and deployment easier. This guide will show you how to containerize a Django web app with Docker and explain why it’s a good idea. We will walk through creating a Docker container for your Django application.

Port 295
article thumbnail

EP144: The 9 Algorithms That Dominate Our World

ByteByteGo

This week’s system design refresher: The 9 Algorithms That Dominate Our World What does API gateway do? How does gRPC work? Docker vs. Kubernetes. Which one should we use? How many API architecture styles do you know? CI/CD Pipeline Explained MVC, MVP, MVVM, VIPER Patterns SPONSOR US The 9 Algorithms That Dominate Our World The diagram below shows the most commonly used algorithms in our daily lives.

Gateway 264
article thumbnail

Design and Reality

Mathias Verraes

The transition to a really deep model is a profound shift in your thinking and demands a major change to the design. Domain-Driven Design , Eric Evans There is a fallacy about how domain modelling works. The misconception is that we can design software by discovering all the relevant concepts in the domain, turn them into concepts in our design, add some behaviours, and voil, weve solved our problem.

article thumbnail

SMB Digital Transformation: Enabling Success by Fostering a Culture of Innovation and Agility

Cisco Wireless

Explore how Rasheeda Frazier of Empowering Greatness Inc. drives digital transformation for SMBs, fostering innovation and agility, and empowering communities through strategic insights and Cisco partnerships.

article thumbnail

How HP is optimizing the 3D Printing supply chain using Delta Sharing

databricks

Javier Lagares is a Principal Data Engineer at HP, where he leads the development of data-driven solutions for the 3D printing business. With.