10

Amazon CTO Werner Vogels' 5 Tech Predictions for 2023 | The Chief I/O | FAUN

 1 year ago
source link: https://factory.faun.dev/newsletters/i/amazon-cto-werner-vogels-5-tech-predictions-for-2023-f00b4766-43d4-46a1-9d64-7210b9a7257c
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

Amazon CTO Werner Vogels' 5 Tech Predictions for 2023

 
⭐ Patrons
 
 
Teleport - the easiest, most secure way to access all your infrastructure.
 
 
Only the open-source Teleport Access Plane consolidates connectivity, authentication, authorization, and audit into a single platform to improve security and agility.

Download Teleport at goteleport.com
 
f551f7b082d4c2241d1b24ede5ea21b2.png
 
 
👨‍💻👩‍💻 Humans Behind Code
 
 
Susa Tünker, Product Manager @ Score: From philosophy to DevOps
 
 
This week in Humans Behind Code, we're happy to have Susa Tünker!

Susa Tünker is the project manager of Score, a developer-centric and platform-agnostic workload specification. It ensures consistent configuration between local and remote environments. And it's open source!

Read the interview to discover more about the Human and the Code!
 
e1806c4885cf9de51a14b6a4332e934f.webp
 
👉Are you the developer/founder of an Open Source project? Apply here and get featured on Humans Behind Code.
 
⭐ Sponsors
 
 
The most advanced cryptocurrency hardware wallet
 
 
The Trezor Model T is the most advanced cryptocurrency hardware wallet. Easily store and protect your Bitcoin, passwords, tokens, and keys with confidence.

👉 Touchscreen - 1.54'' Color LCD
👉 USB - C included
👉 Manage coins in Trezor Suite
👉 Bitcoin, Litecoin, Ethereum (+all ERC-20), and more
👉 1456 Coins & Tokens
👉 Unlimited hidden wallets
👉 and more features!
 
a58d7f4c3e3e4e05a1dc97056adaa910.png
 
 
🔗 From the web
 
 
Dynamic Kubernetes Configuration for GKE
 
 
Sometimes, you want to change or inspect resources on your GKE cluster from outside the cluster. For example you might have a simple Cloud Function or Cloud Run service, that schedules a Pod for you. The challenge can be in regards to setting up the configuration properly to connect to the Kubernetes Master API.

One approach could be to bake a K8S config file into the container or your function code, but this means that you have an environment specific container or function. That’s not really what we want, since it limits transferability of our deployable.

A better approach is to use the GKE API to discover the information we need from the cluster.
 
 
 
Prometheus Monitoring. Easy Explained.   ✅
 
 
What does Prometheus monitor? What are metrics? How it collects the data from Targets? What is an Exporter? What is the problem with the push mechanism andhow Prometheus solves this problem?

This article answers all of these questions and more.
 
107b3d311732e1f7253cc590d5a84041.png
 
 
How Snap made its old stack disappear
 
 
Snap was built on Google App Engine (GAE), a serverless platform for developing and hosting web applications.

Snap started breaking out its back end into microservices that were backed by other services inside of Google Cloud. Shortly thereafter, it added AWS as its second cloud computing provider.
 
 
 
Tech predictions for 2023 and beyond by Amazon.com CTO
 
 
As access to advanced technology becomes even more ubiquitous—as every facet of life becomes data that we can analyze—we will start to see a torrent of innovation, and this will proliferate in 2023.
 
 
 
SREs bring ORDER(R) to CHAOS
 
 
“What’s the difference between a DevOps engineer and a site reliability engineer?”

It’s a question Keith McDuffee hears all the time — and one he've heard (and sometimes asked) in job interviews. But is there a correct answer?

It all depends on who you ask. The author believes there is a line, but it’s so blurry you’d have to squint to see it.
 
 
 
⭐ Supporters
 
 
Post Developers Jobs for Free on FAUN
 
 
Reach developers where they are not where you want them to be.
Post jobs for free reach thousands of developers.
 
f63f3b0d9238b8fa327ffa160fdef617.png
 
 
Join Humans Behind Code
 
 
👉 If you're a Developer or a maintainer of a widely adopted Open Source project and you think it's worth talking about it and your experiences in building it, join Humans Behind Code and get interviewed and published on faun.dev!
 
9a422e90e7739016553223f0d37e339d.png
 
 
Advertise with FAUN
 
 
Meet developers where they are, not where you want them to be. Fill out the form and download our mediakit .
 
6e64d3e75abfb36308de1082bacc8ad7.png
 
 
📺 Quick Hits
 
 
Microsoft-owned GitHub is developing a new tool that will allow developers to code with their voice inside the Copilot pair-programmer.
 
 
AWS has released new development tools for building serverless applications. AWS CodeCatalyst, now in preview, sets up new projects complete with a cloud development environment and CI/CD automation, while Application Composer is for connecting AWS services and generating deployment-ready projects including infrastructure as code.
 
 
AWS Machine Learning University is now launching a free program helping community colleges, minority-serving institutions (MSIs), and historically Black colleges and universities (HBCUs) teach database, artificial intelligence, and machine learning concepts.
 
 
📚 Book picks
 
 
Cloud Native Security
 
 
The book begins with more accessible content about understanding Linux containers and container runtime protection before moving on to more advanced subject matter like advanced attacks on Kubernetes. You'll also learn about:
  • Installing and configuring multiple types of DevSecOps tooling in CI/CD pipelines
  • Building a forensic logging system that can provide exceptional levels of detail, suited to busy containerized estates
  • Securing the most popular container orchestrator, Kubernetes
  • Hardening cloud platforms and automating security enforcement in the cloud using sophisticated policies
  • Perfect for DevOps engineers, platform engineers, security professionals and students,Cloud Native Securitywill earn a place in the libraries of all professionals who wish to improve their understanding of modern security challenges.
 
aabdd9ec98305e02e4c73c7a1b9a1f9d.jpg
 
 
⚙️ Tools
 
 
sudeep9/mojo
 
 
Versioning filesystem for Sqlite
 
 
 
nviennot/core-to-core-latency
 
 
Measures the latency between CPU cores
 
 
 
matanolabs/matano
 
 
Open source cloud-native security lake platform (SIEM alternative) for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS.
 
 
 
turbot/steampipe
 
 
Use SQL to instantly query your cloud services (AWS, Azure, GCP and more). Open source CLI. No DB required.
 
 
👉 Spread the word and help developers find and follow your Open Source project by promoting it on FAUN. Get in touch for more information.
 
🤔 Did you know?
 
 
Re-architecting proprietary solutions into microservices was the most popular cloud native use case within their organizations worldwide in 2022, with around 19 percent of respondents indicating as such. Deploying and testing applications was the second most popular use case among respondents.
 
 
😂 Meme of the week
 
 
 
aa70b421e3720b73a63ac0f107aac83c.png
The Chief I/O #350: Amazon CTO Werner Vogels' 5 Tech Predictions for 2023
Legend: ✅ = Editor's Choice / ♻️ = Old but Gold / ⭐ = Promoted / 🔰 = Beginner Friendly

You received this email because you are subscribed to FAUN.
🐾 FAUN is a world wide community of developers 👣 We help developers learn and grow by keeping them up with what matters.

You can manage your subscription options here (recommended) or use the old way here (legacy). If you have any problem, read this or reply to this email.

Important: We are gradually migrating to a new system. If you don't create an account on FAUN (here), you will stop receiving our weekly newsletter.


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK