I have done systems administration for as long as I remember, and while I have set up countless of services and servers - I have quite limit...
Know when it's time to break up with your customers.
How can you prevent deployments that don't follow best practices from reaching the cluster? In this article you will compare six tools to validate Kubernetes YAML files.
Despite using a FTTH internet connection since 2014, aside from the one fiber uplink, I had always used network gear with 1 Gbit/s links over regular old rj45 cat5(e) cables.
KDE is a funny beast. In a lot of ways, it’s an anarchic society that actually works! Engineers and designers work on KDE software and websites, but none of them are paid by KDE itself. Most …
Artisanal software development, quality productions and some teaching
A Practical Guide to (Correctly) Troubleshooting with Traceroute
Google brought us Kubernetes. But now we see a different side to the organization that made such a smart move when it turned over Kubernetes in 2015 and led the formation of the Cloud Native Computing Foundation (CNCF).
Major improvements over the last year
Using only a Raspberry Pi and an $11 video capture dongle, you can create your own KVM over IP device, allowing you to send keyboard input to a remote computer and capture its display.
I’ve had the privilege of testing and using the brand-new 15.6″ Ryzen-powered KDE Slimbook laptop for the past month. During that time, I worked with the Slimbook developers to perform …
man muss immer umkehren - Carl Gustav Jacob Jacobi(loosely translated - Invert, always, invert) Today, we will look at one of my favourite mental models called - The Inversion principle. Mental models are a set of simple, abstract but useful principles that help us make sense of the world
Over the past five years, I've given dozens of guest lectures at many of the
coding bootcamps in Chicago.
The Intel 8086 microprocessor is one of the most influential chips ever created; it led to the x86 architecture that dominates desktop and...
Twitter was thrown into chaos on Wednesday after accounts for some of the world's most recognizable public figures, executives and celebrities starting tweeting out links to bitcoin scams. Twitter says the attack happened because someone tricked or coerced an employee into providing access to internal Twitter administrative tools. This post is an attempt to lay…
Today a configuration error in our backbone network caused an outage for Internet properties and Cloudflare services that lasted 27 minutes. We saw traffic drop by about 50% across our network.