Jump to content
Search In
  • More options...
Find results that contain...
Find results in...
  • Stories

    The best stories related to our favorite topics from all over the Internet. Find links to the best news, blog posts and stories related to Leadership, Management, Design, Requirements, Development, Operations, Test, Security and Atlassian to mention some topics. Stories is a curated section where any story is welcome as long as it fit the categories and are considered useful and interesting to the community.
    1
    Votes

    Post-Incident Review on the Atlassian April 2022 outage

    atlassian.com - Letter from our co-founders & co-CEOs
    We want to acknowledge the outage that disrupted service for customers earlier this month. We understand that our products are mission critical to your business, and we don't take that responsibility lightly. The buck stops with us. Full stop. For those customers affected, we are working to regain your trust.
    1
    Votes

    Terraform Best Practices for Better Infrastructure Management

    moustakisioannis.medium.com - In this article, we explore best practices for managing Infrastructure as Code (IaC) with Terraform. Terraform is one of the most used…
    Continue reading on Spacelift »
    1
    Votes

    How To Perform Modern Web Testing With TestCafe Using JavaScript And Selenium

    jsfeeds.com - Whether it is an application or web app, every software requires testing after development to ensure it does what we expect it to do. Software testing involves using manual or automated tools. Test automation tools are the best to use over manual tools ... more
    1
    Votes

    35-Word Functional Test Automation Strategy

    zhiminzhan.medium.com - Write 1+ Automated End-to-End Test for a user story; Add it to the regression suite; Run the regression suite daily and keep them valid… Continue reading on Medium »
    1
    Votes

    How To Do A UX Boot Camp

    rbefored.com - If you’re going to attend a UX boot camp, here’s how I suggest that you do it. Continue reading on R Before D »
    1
    Votes

    WebStorm 2022.1.1 Is Available

    jsfeeds.com - WebStorm 2022.1.1, the first bug-fix update for WebStorm 2022.1, is now available! It’s packed with fixes and improvements, including long-awaited support for Vite and a fix for the bug affecting the running and debugging of npm scripts.
    You can update to v2022.1.1 by using the Toolbox App, installing it right from the IDE, or downloading it from our website.
    Vite support
    The big news for this release is that we have added long-awaited support for Vite. Vite is a new breed of build tool that improves the frontend development experience. It consists of two main parts: a dev server that serves your source files over native ES modules and a build command that bundles your code with Rollup, which is pre-configured to output highly optimized static assets for production. In this release, we’ve added support for tsconfig.json/jsconfig.json path mappings in Vue style tags.
    We have plans to add more Vite-related support in our upcoming releases. Stay tuned!
    Other notable improvements
    These are just some of the other notable fixes:
    Fixed the bug causing WebStorm to not work as expected when running and debugging npm scripts (WEB-55457 and WEB-55423). Implemented several improvements for Vue (WEB-54034, WEB-54584, and WEB-55434). @tailwind and @apply tags are now recognized in your .sass files (WEB-38127). Updated the bundled TypeScript version to v4.6 (WEB-55199). If you’re using ESLint 8.2 or higher, extra ESLint options will now be applied as expected (WEB-54388). WebStorm will now automatically suggest the path to a package manager if a remote Node.js interpreter is chosen (WEB-52982). Fixed the issue that was disabling Sort tabs alphabetically when tabs were dragged and dropped in a different editor window (IDEA-283610). For the full list of issues addressed in WebStorm 2022.1.1, please see the release notes.
    The WebStorm team

    1
    Votes

    Typescript components for Shadow Drive

    jsfeeds.com - Typescript components for Shadow Drive.
    Quick Setup
    Install
    Install these dependencies:
    yarn add @shadow-drive/sdk Setup (React)

    import React, { useEffect } from "react"; import * as anchor from "@project-serum/anchor"; import ShdwDrive from "@shadow-drive/sdk"; import { AnchorWallet, useAnchorWallet, useConnection } from "@solana/wallet-adapter-react"; export default function Drive() { const { connection } = useConnection(); const wallet = useAnchorWallet(); useEffect(() => { (async () => { if (wallet?.publicKey) { const drive = await new ShdwDrive(connection, wallet).init(); } })(); }, [wallet?.publicKey]) return ( <div></div> ) } Setup (NodeJS)

    import ShdwDrive from "@shadow-drive/sdk"; const drive = await new ShdwDrive(connection, wallet).init(); Examples
    package description node Using shadow-drive in a nodejs environment components react Using shadow-drive in a react/browser environment Build From Source
    Clone the project: git clone https://github.com/genesysgo/shadow-drive.git Install dependencies:
    cd shadow-drive yarn install GitHub
    View Github

    1
    Votes

    Part One of Infrastructure as Code (IAC) using Terraform: A High Level-Overview

    medium.com - Part One of Infrastructure as Code (IAC) using Terraform: A High Level-Overview
    Photo by Mohammad Rahmani on UnsplashWhen creating a cloud-native application, it is critical to establish a highly secure, robust, sustainable, and highly available infrastructure. This was done manually by software engineers, which could lead to errors, and the infrastructure is not reusable or transferable, so something had to be done. To assist with this issue, infrastructure as code (IAC) was built. There will always be errors, but this technique makes it easier to find them, reuse the infrastructure, and, if required, transfer the environment.
    In order to understand Terraform, we must first define the concept infrastructure as a code (IAC), since both concepts are interconnected.
    What is Infrastructure as Code (IAC)
    How do you define the aforementioned “infrastructure”? Hardware, software, operating systems, and data storage are all involved. This “infrastructure” includes both cloud and on-premises infrastructure.
    So, in this piece, terraform will be covered, why is so important, as well as how it connects to infrastructure as code.
    What is Terraform?
    Terraform is widely used to provision cloud infrastructure since it works with so many providers, including AWS, Azure, GCP, Alibaba Cloud, and Oracle Cloud. Terraform supports on-premises infrastructure but not stand-alone infrastructure; on-premises infrastructure must use OpenStack or VMWare, both of which are supported by Terraform.
    Terraform allows users to conduct multi-cloud functions such as utilizing the Azure Data Factory, which is only accessible on Azure, Google BigQuery, which is only available on Google Cloud Platform, or Amazon Lambda, which is only available on Amazon Web Services. Terraform may be used to develop and manage all of the aforementioned infrastructures.
    Why is Terraform Important?
    DevOps’ major purpose is to execute more effective software delivery and to make delivery fast and speedy. We require solutions like Terraform, which assist businesses with infrastructure as code and automation. It is revolutionizing the DevOps world by altering the way infrastructure is handled, making DevOps execution faster and more efficient. For automating and provisioning software, there are tools such as Ansible, Chef, and Puppet. Terraform follows the same “infrastructure as code” principle, but it focuses on infrastructure automation. Complete cloud infrastructure, including instances, IP addresses, volumes, and networking, may be readily established.
    Terraform Use cases
    Terraform supports services supplied by PaaS providers such as Heroku. Heroku is a platform for hosting web applications. Developers construct a program and then add add-ons such as a database or email provider. Its best feature is the ability to elastically scale the number of dynos or workers. Terraform is used to codify the Heroku application configuration, guaranteeing that all essential add-ons are available. Other configurations such as setting up a custom CNAME can also be done with Terraform in very little time. Terraform allows one to spin up environments to test software in, and then dispose of the environment. Furthermore, if the operators are happy with the status of an application in the staging environment, that staging environment may be readily cloned and utilized as the production environment. Terraform is cloud-agnostic, allowing a single configuration to manage different providers as well as cross-cloud dependencies. This reduces administration and orchestration complexity, allowing operators to develop large-scale multi-cloud systems. Benefits of Using Terraform
    Terraform allows users to commit their Infrastructure-as-Code to VCS (version control system) to foster collaboration and keep track of changes If your chosen Terraform plugin or provider is not available on the Terraform Registry, you may simply design your own and connect it with Terraform to easily construct your infrastructure. Teams can use Terraform to assess and comment on infrastructure. Terraform supports state management (storage, viewing, history, and locking), as well as a web interface for watching and authorizing Terraform processes. Terraform is more concerned with server provisioning. When the entire cloud infrastructure is viewed as code and all parameters are merged in a configuration file, all team members may simply collaborate on them as they would any other code. Before we continue, there is a question that many people have about Terraform: what is the difference between Terraform and Ansible?
    It’s worth noting that they’re both Infrastructures as a code, which means they’re both used to automate provisioning, configuring, and maintaining infrastructure, but there are some main differences and they are :
    Terraform is primarily an infrastructure provisioning tool, but can also be used to deploy applications and other tools on the provisioned infrastructure. Ansible, on the other hand, is primarily a configuration tool, which means that once the infrastructure has been provisioned, Ansible can now be used to configure the infrastructure, deploy applications, and install/update software on the infrastructure. Ansible is more mature. While Terraform is relatively new, and because of that, it changes dynamically. Ansible is immutable, which means it cannot be altered once it has been configured, but Terraform is changeable, which means it may be updated after it has been supplied. There are overlaps in what each tool accomplishes, which might lead to misunderstanding. The essential takeaway is that Terraform is a “superior” solution for infrastructure provisioning, but Ansible is better for configuring provisioned infrastructure. It is typical practice for DevOps engineers to employ a combination of both to cover the entire setup end to end, rather than relying just on one tool.
    Terraform Architecture
    There are two main components that make up its architecture. The first one is:
    The Core: The core requires two input sources to function. The first is that it employs Terraform configuration, which allows you as a user to specify what needs to be produced or provided. The second input source is Terraform state, which is the most recent state of how the infrastructure is currently configured. As a result, the core evaluates the present state and the intended configuration, and if there is a discrepancy, it determines what has to be done to achieve the desired state. Providers: Terraform relies on plugins called “providers” to interact with cloud providers, SaaS providers, and other APIs. After determining the status of the infrastructure via the Terraform config file, the Core interacts with the selected cloud provider using the Terraform plugin to construct, update, or remove the desired infrastructure.
    You now have a better understanding of how Terraform works, the advantages of using it, and some of its real-world applications. In the next post, we’ll use Terraform to provision an AWS VPC, Subnet, Security Group, and EC2 instance on AWS.
    Thank you for taking the time to read this!
    Thank you for reading! do leave a clap. You can reach out to me on Twitter or LinkedIn
    1
    Votes

    European startup studio eFounders launches a web3 vertical

    techcrunch.com - While last week was without a doubt the worst week for crypto asset performance in a very long time, it doesn’t seem to be stopping eFounders. The software-as-a-service startup studio is announcing that it is launching a new sub-studio called 3founders.
    As the name suggests, 3founders is focused on ‘web3’ startups, such as blockchain-related projects, NFT-enabled startups and crypto-friendly businesses. With this move, the eFounders team is betting that web3 isn’t just a fad or a buzzword. This isn’t the first time eFounders creates a separate sub-studio. Last year, eFounders also launched Logic Founders, a fintech-focused studio headed by Camille Tyan.
    This also isn’t the first time eFounders launches a crypto startup. The studio has built a crypto wallet for SMBs, which later became Multis.

    If you’re not familiar with eFounders, the startup studio comes up with ideas for new startups, teams up with two co-founders and help with the product-market fit phase in exchange for a stake in the startup.
    Some portfolio companies include Aircall, Spendesk and Front. Overall, eFounders has launched 33 companies. They generate $170 million in annual recurring revenue and employ 2,000 people when you combine them all.
    As for 3founders, the sub-studio will soon have its own team and its own portfolio of startups. But for now, there’s not much to see. eFounders co-founder Thibaud Elziere will be the interim head of studio and Salesmachine co-founder Florent Quinti will be the first 3founders employee.
    3founders’ first startup will be Cohort. Co-founded by CEO Séraphie de Tracy and CTO Nathan Barraillé, this new startup will let brands and organizations offer NFTs to their most loyal community members.
    With these tokens, customers will be able to access exclusive experiences. It reminds me of what OurSong or Royal have been trying to do with music artists.
    “We are currently working on several web3 ideas and aim to launch more startups rapidly,” Florent Quinti said in a statement. “We’re looking at reinventing the CRM in a native web3 world and we are also exploring developer tools to allow web2 companies to integrate web3 experiences in their products without compromising on the user experience.”
    In other words, we’ll keep an eye on 3founders’ projects as it’s going to be interesting to see whether 3founders can build a track record that looks like eFounders’ track record.

    1
    Votes

    Sysdig Open Source is Extended to Secure Cloud Services

    devops.com - New integration enables any Falco plugin to be used for Sysdig OSS
    VALENCIA, SPAIN, (KubeCon + CloudNativeCon Europe), May 16, 2022 — Sysdig, the unified container and cloud security leader, announced that Sysdig open source, the incident response standard for containers, has been extended to the cloud. Using system calls, Sysdig open source (Sysdig OSS) traditionally offers deep observability into running applications, as well as file system access and network activity, which speeds incident response and troubleshooting. Teams can quickly filter information from Sysdig OSS and take action. With the announcement of this new integration, these capabilities have been extended beyond containers to any cloud environment.
    The complexity of cloud-native applications – with countless components and variables – makes it extremely difficult for security analysts and system administrators to quickly triage alerts and debug problems. Sysdig OSS captures process, file system, and network activity in real time and with a high degree of granularity. The tool, which has nearly two million downloads and 6,850 GitHub stars, surfaces everything from executed commands and file system activity to network activity. Sysdig OSS then offers advanced filtering and troubleshooting capabilities, supporting root cause analysis for security and performance issues.
    Using a new plugin framework – originally developed by the open source community for the CNCF project Falco – Sysdig extends the number of sources Sysdig OSS can be connected with to anything that generates logs or events, including Azure, Google, and AWS CloudTrail logs. Going forward, every plugin developed for Falco can also be leveraged by Sysdig OSS. Using one tool, like Sysdig OSS, to observe events from the entire cloud-native environment streamlines investigations. Using a different tool for each environment adds complexity, which makes it massively harder to troubleshoot.
    Learn more about this framework in the Sysdig OSS 0.29 new release blog
    Sysdig’s Commitment to Open Source
    Sysdig was founded as an open source company and Sysdig Secure and Sysdig Monitor were both built on an open source foundation to address the security challenges of modern cloud applications. Both projects were created by Sysdig to leverage deep visibility as a foundation for security, and they have become standards for container and cloud threat detection and incident response. Falco, which was contributed to the CNCF in 2018, is now an incubation-level hosted project with more than 45 million downloads.
    1
    Votes

    Sysdig Introduces Sysdig Advisor to Drastically Simplify Kubernetes Troubleshooting

    devops.com - Single view of performance and events accelerates Kubernetes troubleshooting by up to 10x
    VALENCIA, SPAIN, (KubeCon + CloudNativeCon Europe), May 16, 2022 — Sysdig, the unified container and cloud security leader, announced the availability of Sysdig Advisor, a Kubernetes troubleshooting feature that consolidates and prioritizes relevant performance details in Sysdig Monitor. By providing a single view of performance and event information, Sysdig Advisor enables operations, developers, and site reliability engineering (SRE) teams to troubleshoot issues faster while decreasing the number of tools needed.
    Video: In real-time, watch troubleshooting of the same issue with and without Sysdig Advisor.
    The complexity of Kubernetes – with countless components and variables – makes it extremely difficult to debug problems and prioritize actions. Knowing how to debug, where to begin, or what to look for can be a challenge. Operations teams and SREs are often forced to pull up the command line interface and run tools like kubectl to inspect the situation and search for the root cause. With so many moving parts in Kubernetes-based applications, remediation can take hours or more, decreasing availability and impacting the end-user experience.
    With a click of a button, Sysdig Advisor presents all relevant capacity, event, alerts, and troubleshooting information. Since this information is presented in the context of Kubernetes objects, users can quickly drill down when looking for the source of a performance problem. Sysdig Advisor displays a prioritized list of issues and related live logs to surface the biggest problem areas and accelerate time to resolution.
    Key Benefits of Sysdig Advisor 
    Accelerates troubleshooting by up to 10x: Sysdig Advisor produces a prioritized list of issues, giving administrators visibility into what problems to address first. When compared to traditional methodologies, teams can resolve Kubernetes issues up to 10x faster with Sysdig Advisor by reducing the time it takes to find critical information, including capacity, utilization, event, and alert data for clusters, namespaces, workloads, and pods.  Reduces troubleshooting resource count: Sysdig Advisor reduces the dependence on a side-by-side comparison of blogs, dashboards, logs, and command line output needed to troubleshoot Kubernetes environments. The simple user interface surfaces all the important details in a single unified tool with a curated, actionable set of steps for remediation. Increases troubleshooting access without increasing security risk: Security teams are often concerned about providing broad access to command-line tools, such as kubectl. Sysdig Advisor provides quick access to the same level of information to users across the organization, without being overly permissive. “Kubernetes is complex, with countless components and variables that make it difficult to understand how, why, and when something goes wrong. Any SRE knows the pain of wading through multiple tools and getting multiple teams involved when troubleshooting an alert,” said Loris Degioanni, founder and CTO at Sysdig. “Now with Sysdig Advisor, they can efficiently debug issues and get back to work on deploying new releases.”
    The Sysdig Approach 
    Sysdig is driving the standard for unified cloud and container security so DevOps and security teams can confidently secure containers, Kubernetes, and cloud services. Sysdig offers two products, Sysdig Secure and Sysdig Monitor, and the Sysdig platform architecture underpins both products. Sysdig Monitor provides cloud and Kubernetes monitoring that is fully open source Prometheus compatible. With Sysdig Secure, teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions, and compliance. Sysdig provides a single view of risk from source to run, with no blind spots, no guesswork, no black boxes.
    Availability 
    Sysdig Advisor is available now to Sysdig Monitor users at no additional cost. Additional troubleshooting features will be introduced over the coming weeks.
    Resources
    About Sysdig
    Sysdig is driving the standard for cloud and container security. The company pioneered cloud-native runtime threat detection and response by creating Falco and Sysdig as open source standards and key building blocks of the Sysdig platform. With the platform, teams can find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions, and compliance. From containers and Kubernetes to cloud services, teams get a single view of risk from source to run, with no blind spots, no guesswork, no black boxes. The largest and most innovative companies around the world rely on Sysdig.
    Media Contact
    Amanda McKinney Smith
    [email protected]
    703-473-4051
    1
    Votes

    21 Best Neo-Grotesque Fonts to Download

    design.tutsplus.com - This font is inspired by geometrical shapes, and the designer has mastered the kerning on the characters to create the best-looking typeface. Rolves is a modern neo-grotesque sans serif font designed with logic in mind.
×
×
  • Create New...