Welcome to Sleepless Links! The links are a little thin this week as I’ve been a bit busier than usual, but there are still quite a few worth checking out.
Below is the curated list for the week ending March 13th, 2022:
Good thoughts from Tom Gillis about the Log4j vulnerability in The Lessons Of Log4J: It May Seem Like Last Year’s News, But Don’t Ignore The Implications Of This Attack.
If you run infrastructure, there are some good lessons in this post about Applying Product Thinking to Slack’s Internal Compute Platform.
We sometimes need to be reminded that simpler is almost always better. This post by Dan Luu highlights Some benefits of simple software architectures. Not all systems need to be radically decomposed into microservice architectures.
This blog post about Asynchronous Logging in Corretto 17 made me nostalgic for the thread-based Java logging framework we built back in my Delta Technology days.
Not a blog post or article, but this online Cloud Infrastructure Map took me down a rabbit hole for a while.
It wouldn’t be a Sleepless Links post without something crypto related. This week it’s The Web3 Fraud by Nicholas Weaver.
Bonus crypto content this week from MIT Tech Review about Why Ethereum is switching to proof of stake and how it will work.
That’s it for this week - happy reading!
Comments