Welcome to Sleepless Links! From time to time I’ll share a curated set of links to blogs, news stories, product information, etc. that have caught my attention. I find that it’s useful to provide the links with a small amount of context so that you, the reader, don’t have to blindly click the link without knowing why I found it interesting.
Below is the curated list for the week ending February 27th, 2022:
The Russian invasion of Ukraine has dominated the news this week. It’s a long-ish read, but Miscellanea: Understanding the War in Ukraine provides a historian’s view into the background and considerations at play.
Related to the situation in Ukraine, Chris Krebs and the Krebs Stamos Group put out a helpful post for corporations and security professionals to reference as they prepare for the worst: Shields Up.
I’ve been poking at learning Rust as a relaxing “side project” over the last few weeks. One particular area of interest for me is automation and telemetry, and the stuff I normally work on requires lots of asynchronous activity. This post about Async Rust: Futures, Tasks, Wakers—Oh My! does a good job explaining some of the innards of asynchronous Rust.
A bit of a “told you so” article, but Vice has a post on why The Hyperloop Was Always Going to Go This Way.
I was fighting some WiFi performance issues this week, and this post about The 5GHz “Problem” For Wi-Fi Networks: DFS helped me better understand channel selection for 5GHz SSIDs on my WiFi AP/router, and why picking a DFS channel made it take longer for my WiFi to come back after changing channels. It turns out a neighbor put in some new Ubiquiti gear that was stomping on my 5GHz channel. Shifting to a different channel for both my 2.4GHz and 5GHz SSIDs put an end to the throughput problems I was having.
Last week I mentioned a situation where a job candidate had someone impersonate them in order to get through the interview process. This situation was way, way worse: Jobfished: the con that tricked dozens into working for a fake design agency.
Interesting post by Jessica Joy Kerr about why Every SaaS Integration needs an Upstream Point of Contact. Async architectures and microservices are awesome, but they can introduce problems when there is no feedback mechanism to alert about failures that occur “later” downstream.
I gave up Chrome and have been a Safari user on my personal macOS/iOS devices for a while, but this post about Why one of the world’s most popular web browsers rarely gets the respect it deserves helped me better understand the philosophy behind the way Apple approaches Safari development.
Dan Kirsch makes some interesting points in Three Cloud Trends to Watch in 2022. I need to dig into the alternative CSP market a bit more.
I think we have a long tail of COVID second- and third-order effects yet to come, and this post explaining that A military veteran knows why your employees are leaving highlights some of the reasons why.
Another long read, but this Foriegn Affairs post about The Cyber Social Contract is worth the time to digest. Much work to do in this space for sure.
Not every enterprise should try to replicate the practices of the FAANG bunch, as highlighted in this article about Building for the 99% Developers. I’ve always been a proponent of loose adoption of new approaches - take from them what works for your situation, and don’t feel bad about not using the parts that don’t fit. H/T to Keith Townsend for the pointer on this one.
I’m definitely seeing more movement toward bringing Cloud capability closer to the enterprise (Outposts, AzureStack, Equinix Metal, et al), and this post about Cloud Shift May Accelerate as Edge Extends Into On-Premises Facilities highlights some of the recent developments in this space.
Good overview by Marty Brodbeck, CTO at Pricelne, about Building and running microservices at scale: A CTO’s view and the use of 12-factor methodology.
Last but not least, Arista made some interesting announcements this week related to their acquisition of Awake Security in late 2020. Jayshree Ullal covers the key points in her blog post about The Migration from Network Security to Secure Networks.
That’s all for this week - enjoy!
Comments