Listen

Listened to Container Security with Maya Kaczorowski
Post details
Deploying software to a container presents a different security model than deploying an application to a VM. There is a smaller attack surface per container, but the container is colocated on a node with other containers. Containers are meant to have a shorter lifetime than VMs, so there are generally fewer consequences if a container

 Listen

Listened to Gloo: Function Gateway with Idit Levine
Post details
Gloo is a function gateway built on top of the popular open source project Envoy. The goal of Gloo is to decouple client-facing APIs from upstream APIs. Gloo is similar to an API gateway, which is a tool that software companies can use to collect all their APIs and one place and impose security, monitoring,

 Listen

Listened to Building Datadog with Alexis Le-Quoc
Post details
Alexis Le-Quoc started Datadog in 2010, after living through the Internet boom and bust cycle of the late 90s and early 2000s. In 2010, cloud was just starting to become popular. There was a gap in the market for infrastructure monitoring tools, which Alexis helped fill with the first version of Datadog. Since 2010, the

 Listen

Listened to Building Web Applications for the next Billion Users with Ire Aderinokun by Scott Hanselman 
Post details
Ire Aderinokun is a self-taught UI/UX Designer and Front-End Developer working in Lagos, Nigeria. She is currently the Technical Lead at Big Cabal Media. She says the Next Billion Users are coming online now and they'll be outside Western countries and they'll be mobile first. What do we need to know as Web Developers to create great apps and sites for the Next Billion?

 Listen

Listened to Technology Utopia with Michael Solana
Post details
Technology is pushing us rapidly toward a future that is impossible to forecast. We try to imagine what that future might look like, and we can’t help having our predictions shaped by the media we have consumed. 1984, Terminator, Gattaca, Ex Machina, Black Mirror–all of these stories present a dystopian future. But if you look

 Listen

Listened to Episode 35 - Interview with Tech Icon Adam Jacob, CTO of Chef - The Tech Fugitives Show!
Post details
Welcome back to the Tech Fugitives podcast.  No Safe spaces today.  Straight talk from the “No A-hole” zone with Chef CTO, Adam Jacob. Just because you’re infrastructure is code, doesn’t mean you’re not an A-Hole.  Don’t be that person…Listen to Adam Jacobs.  Chef was clearly the tip of the sword during the birth of DevOps.  …

 Listen

Listened to A history of the Windows 95 Start Button and User Research at Microsoft with Kent Sullivan and Derek Hoiem by Scott Hanselman 
Post details
Kent Sullivan and Derek Hoiem were some of the original hires at the User Research Labs at Microsoft. The worked on the exploratory user research that produced the taskbar and Start menu, as well as the iterative research that helped nail down the details. How did the Start Menu and Start Button come to be?

 Listen

Listened to Stripe Observability Pipeline with Cory Watson
Post details
Stripe processes payments for thousands of businesses. A single payment could involve 10 different networked services. If a payment fails, engineers need to be able to diagnose what happened. The root cause could lie in any of those services. Distributed tracing is used to find the causes of failures and latency within networked services. In

 Listen

Listened to Pursuit Podcast: Freelancing Long Term: Remy Sharp
Post details
Thinking about getting into freelancing and wondering what the long term impacts of working for yourself might be? Or perhaps you've been working for yourself for some time and want to see how your experiences stack up? Battle-scarred veteran freelancer of joins us to talk about the challenges of working for yourself long term. We'll look at isolation, avoidance and motivation, offering tips and tricks to help you do more.

 Listen

Listened to Chaos Engineering with Kolton Andrus
Post details
The number of ways that applications can fail is numerous. Disks fail all the time. Servers overheat. Network connections get flaky. You assume that you are prepared for such a scenario because you have replicated your servers. You have the database backed up. Your core application is spread across multiple availability zones. But are you