Reducing Javascript
How Facebook Deals with PCI-Faults
Schrödinger’s Code Undefined behavior in theory and practice
AI – Hall of Shame
Designing a REST-API
Pitfalls Of Java Parallel Streams
A blog post on low-code
Conditional HTTP GET
Stack Overflow Sold to Tech Giant Prosus
Stackexchange download
An Introduction to Knowledge Graphs
Uber Architecture to manage and monitor APIs
Don’t just shorten your URL, make it suspicious and frightening.
How to get HTTPS working on localhost
Looks more complete than my own docu:
Gitlab: 2021 Global DevSecOps Survey
Open sourcing Pixie under Apache 2.0 license
Pixie is an in-cluster observability platform for Kubernetes. It’s designed to be a low friction tool for developers to debug and monitor their applications.
Convert curl commands to code
Password Leaks in Docker
https://pythonspeed.com/articles/leaking-secrets-docker/
“How can you prevent copying in secrets by mistake?
- Limited copying: Instead of
COPY . /app
you might copy only specific files or directories you know you need. For example,COPY setup.py myapp /app
. - .dockerignore: You can make sure files don’t get
COPY
ed in by adding them to the.dockerignore
file. - Avoid manually building images: Your development machine is much more likely to have random files lying around than an automated build system, so building public images on your dev machine is more likely to leak files.
- Store CI secrets as environment variables: If your CI or build environment needs to use secrets, keep them in environment variables rather than files on disk.”
Köln mit Inzidenz über 230
Schulen bleiben am 23.4. aber auf. Warum?