Quantcast
Channel: Cloudier Than Thou
Browsing latest articles
Browse All 48 View Live

Image may be NSFW.
Clik here to view.

Apple’s iCloud is a multi-cloud beast

Apple device users have probably taken and stored 100 billion photos: In early 2013, the number was 9 billion There are 100 million iPhones in active use in 2015. If each iPhone takes 1000 pictures per...

View Article



Image may be NSFW.
Clik here to view.

Consul-template and Citrix Netscaler

Consul-template (consul-template) is a tool that can drive reconfiguration of applications and infrastructure in response to changes in the keys/values stored in Consul. Usually it is used to populate...

View Article

Image may be NSFW.
Clik here to view.

A (round)trip with Java and Go

Can you generate Go code from a Java binary jar? This need arose from writing a prototype Ingress Controller  for Kubernetes that uses a NetScaler to provide the Ingress function. Another need was a...

View Article

Image may be NSFW.
Clik here to view.

Design patterns in orchestrators (part 1 of n) – idempotent operations

Orchestration is a somewhat overloaded term in the context of automation. Generally, it implies a central controller that tries to bring a complicated system to a desired state. There are usually a...

View Article

Image may be NSFW.
Clik here to view.

Design patterns in Orchestrators (part 2 of N) – southbound APIs

This is part of a series on design patterns in building orchestration systems. The focus is on orchestrators found in clouds, data-centers, networking systems, etc, but the principles should be broadly...

View Article


Image may be NSFW.
Clik here to view.

Design patterns in orchestrators: transfer of desired state (part 3/N)

Most datacenter automation tools operate on the basis of desired state. Desired state describes what should be the end state but not how to get there. To simplify a great deal, if the thing being...

View Article

Image may be NSFW.
Clik here to view.

WORA! WORA! WORA !— the Kubernetes stealth attack

Tora!Tora!Tora! was the code word used to signify complete surprise had been achieved in the attack on Pearl Harbor. Photo Credit: Ebdon on Wikimedia WORA — Write Once, Run Anywhere was the term...

View Article

Image may be NSFW.
Clik here to view.

The Half Life of Programming Knowledge

Programming is hard. I relearned this lesson recently. From time to time, I go on a decluttering spree at home, throwing / donating / recycling things I haven’t used in a while. Last week, the bottom...

View Article


Image may be NSFW.
Clik here to view.

The Elephant in the Giraffe House

Photo by Julian Link on Unsplash The Elephant in the Giraffe House I listen to podcasts on my commute, and the a16z podcast never disappoints. On the episode “On Mentors and Mentees”, the guest Ken...

View Article


Image may be NSFW.
Clik here to view.

7 good reasons to open source your code

Open source software — software that is free to the user and whose source code can be modified and distributed freely — is ubiquitous and offers solutions to a wide range of needs. Open source as a...

View Article
Browsing latest articles
Browse All 48 View Live




Latest Images