Operating Systems, such as Linux, tend to write data within files on hard disk drivces (HDD) during runtime. This also occurs within virtualized and/or containerized environments. Based on workloads, logs and application data generate hard disk i/o which slows down application performance and processes the lifespan of physical hardware such as HDD, SSD or hybrid devices.
I spent some time to find out how to enable TLS for all of my Kubernetes services, which are available on my website. Many of the pods reference reverse-proxy functionality for TLS termination. This would require additional pods running Nginx (reverse proxy) having a maintained TLS certificate for the same domain (*.fas-consulting.de). Next to inbound traffic, I focus on TLS communication between pods only.
I just spend some time on current updates for microservice architectures, as I noticed a nice tech-talk on from InfoQ of 2016. Josh Evans talks about the chaotic and vibrant world of microservices at Netfilx, before certain updates took place. Enjoy the session:
Currently many startups start to play with API Services, which stands for Application Programming Interface. It's basically interfaces to consume services of provided by people or companies. There are some common formats used nowadays, such as SOAP (Simple Object Access Protocol) and ReST (Restfull State Transfer). Let's first discuss the differences between those key terms for services:
Java Enterprise Edition (JEE) Architecture
Java Enterprise Edition Architecture is a specification for software architecture for enterprise context. Therefore the following functionality is in-focus:
- Web applications
- Transaction security
- Administration of users and data
- High availability
- Load safety
- Corruption security
- Cearly defined interfaces
- Modular components
There are many approaches available for gatekeeping. For instance Amazon WebServices (AWS) offers functionality for load balancing, even accross regions or countries. Some scenarios require further functionality for gatekeeping; especially when load and routing becomes part of such requirements. Therefore I would like to distinguish between pure load balancers - such as in AWS - and real gatekeepers like Netflix Zuul.
Unattended servers normally do provide a minimum set of applications to avoid security vulnerabilities due large amout of software. In some cases people still want to install a remote User Interface (UI) session to those servers to play around with technology. There are multiple tools which can be utilized:
Cognitive computing is the next level of software development. The classical appraoches via tabulators, procedural or object based programming will be replaced with a new paradigm called cognitive computing. It can be seen as a new discipline, opening new possibilities for business and IT, connected to the currently joung generation of people. They are used to mobile devices, support chats and phone bots. Old channels like classical support is not always expected anymore as it is too slow in some scenarios.
A few days ago while being stucked in a huge traffic jam I noticed an intersting option within my Volkswagen EOS within the bluetooth options for connected phones. It is called Bluetooth Premium, is available via the VW Package 5K0035730D / 7P6035730 and implementes the Remote-Sim Access Protocol (r-SAP).