New codingmarks added in the 21th week of 2018
Save up to a workweek a year by efficiently managing your coding bookmarks, aka #codingmarks, on www.codingmarks.org.
Share your favorites with the community and they will be published weekly on Github.
Help us build the programming-resources location - Star
New codingmarks added in the 21th week of 2018. Hot topics include:
- apache-kafka
- architecture
- async
- cloud
- continuous-deployment
- cryptography
- database
- docker
- filesystem
- glossary
- go
- java
- javascript
- lua
- openshift
- pki
- ruby
- security
- ssl
- storage
- tls
apache-kafka
Apache Kafka as an Event-Driven Backbone for Service Architectures
- published on: 2017-07-19
- tags: apache-kafka, architecture
Learn how Apache Kafka differs from traditional messaging technologies, configurations you should consider, and patterns you should implement or avoid.
How Apache Kafka Inspired Our Platform Events Architecture
- published on: 2018-02-01
- tags: apache-kafka, architecture, async
There’s a class of scalability challenges that are best approached using an asynchronous, event-driven architecture — particularly when it comes to doing data integrations.
- tags: apache-kafka
- github url
Apache Kafka: A Distributed Streaming Platform.
architecture
Apache Kafka as an Event-Driven Backbone for Service Architectures
- published on: 2017-07-19
- tags: apache-kafka, architecture
Learn how Apache Kafka differs from traditional messaging technologies, configurations you should consider, and patterns you should implement or avoid.
How Apache Kafka Inspired Our Platform Events Architecture
- published on: 2018-02-01
- tags: apache-kafka, architecture, async
There’s a class of scalability challenges that are best approached using an asynchronous, event-driven architecture — particularly when it comes to doing data integrations.
Sharding & IDs at Instagram – Instagram Engineering
- published on: 2012-12-30
- tags: architecture
With more than 25 photos and 90 likes every second, we store a lot of data here at Instagram. To make sure all of our important data fits into memory and is available quickly for our users, we’ve begun to shard our data — in other words, place the data in many smaller buckets, each holding a part of the data.
async
Zuul 2 : The Netflix Journey to Asynchronous, Non-Blocking Systems
- published on: 2016-09-21
- tags: async
- github url
We recently made a major architectural change to Zuul, our cloud gateway. Did anyone even notice!?
How Apache Kafka Inspired Our Platform Events Architecture
- published on: 2018-02-01
- tags: apache-kafka, architecture, async
There’s a class of scalability challenges that are best approached using an asynchronous, event-driven architecture — particularly when it comes to doing data integrations.
cloud
- tags: filesystem, cloud, storage
- github url
Gluster is a software defined distributed storage that can scale to several petabytes. It provides interfaces for object, block and file storage.
How to Create an S2I Builder Image – OpenShift Blog
This article is about creating a simple S2I builder image in OpenShift 3.
continuous-deployment
Source-to-Image (S2I) is a toolkit and workflow for building reproducible Docker images from source code. S2I produces ready-to-run images by injecting source code into a Docker container and letting the container prepare that source code for execution. By creating self-assembling builder images, you can version and control your build environments exactly like you use Docker images to version your runtime environments.
cryptography
SSL/TLS handshake Protocol - YouTube
- published on: 2018-02-11
- tags: security, cryptography, ssl, tls
What protocol is used between a web server and its clients to establish trust? How do they negotiate and share the secret key? During the handshake process, how public key encryption algorithm is used and how private key encryption is used? In this video, you would find all these answers.
What is digital signature? - YouTube
- tags: security, cryptography
A digital signature is equivalent to a handwritten signature in paper, and a digital signature serves three basic purposes. Digital signature is commonly used for software distribution, financial transactions and other cases where it is important to detect forgery. Digital signatures are very popular with e-mail users.
In this video, I will talk about the digital, uses, and the whole process of creating and sending digitally signed document over the Internet.
Keep in mind, digital signature is not about encrypting document, just like paper-based signature.
Beware:
Public key encrypts, private key decrypts (encrypting)
Private key encrypts, public key decrypts (signing)
How does a public key verify a signature? - Stack Overflow
- tags: security, cryptography
Public key encrypts, private key decrypts (encrypting)
Private key encrypts, public key decrypts (signing)
database
In the field of databases in computer science, a transaction log (also transaction journal, database log, binary log or audit trail) is a history of actions executed by a database management system used to guarantee ACID properties over crashes or hardware failures. Physically, a log is a file listing changes to the database, stored in a stable storage format.
docker
Source-to-Image (S2I) is a toolkit and workflow for building reproducible Docker images from source code. S2I produces ready-to-run images by injecting source code into a Docker container and letting the container prepare that source code for execution. By creating self-assembling builder images, you can version and control your build environments exactly like you use Docker images to version your runtime environments.
filesystem
- tags: filesystem, cloud, storage
- github url
Gluster is a software defined distributed storage that can scale to several petabytes. It provides interfaces for object, block and file storage.
glossary
In the field of databases in computer science, a transaction log (also transaction journal, database log, binary log or audit trail) is a history of actions executed by a database management system used to guarantee ACID properties over crashes or hardware failures. Physically, a log is a file listing changes to the database, stored in a stable storage format.
go
Hashids - generate short unique ids from integers
- tags: javascript, ruby, go, java, lua, security
- github url
Generate short unique ids from integers. Use in url shortening or as unique ids.
java
Hashids - generate short unique ids from integers
- tags: javascript, ruby, go, java, lua, security
- github url
Generate short unique ids from integers. Use in url shortening or as unique ids.
javascript
Hashids - generate short unique ids from integers
- tags: javascript, ruby, go, java, lua, security
- github url
Generate short unique ids from integers. Use in url shortening or as unique ids.
lua
Hashids - generate short unique ids from integers
- tags: javascript, ruby, go, java, lua, security
- github url
Generate short unique ids from integers. Use in url shortening or as unique ids.
openshift
Source-to-Image (S2I) is a toolkit and workflow for building reproducible Docker images from source code. S2I produces ready-to-run images by injecting source code into a Docker container and letting the container prepare that source code for execution. By creating self-assembling builder images, you can version and control your build environments exactly like you use Docker images to version your runtime environments.
How to Create an S2I Builder Image – OpenShift Blog
This article is about creating a simple S2I builder image in OpenShift 3.
pki
PKI - trust & chain of trust -why, who and how? - YouTube
What is public key infrastructure? What is trust? Why do we need trust over the Internet? Who should be trusted?
In this video, I will talk about two trust models: Hierarchical Trust Model and distributed trust model, and how they help us to build trust with strangers over the Internet so that we could be able to do business online.
ruby
Hashids - generate short unique ids from integers
- tags: javascript, ruby, go, java, lua, security
- github url
Generate short unique ids from integers. Use in url shortening or as unique ids.
security
PKI - trust & chain of trust -why, who and how? - YouTube
What is public key infrastructure? What is trust? Why do we need trust over the Internet? Who should be trusted?
In this video, I will talk about two trust models: Hierarchical Trust Model and distributed trust model, and how they help us to build trust with strangers over the Internet so that we could be able to do business online.
SSL/TLS handshake Protocol - YouTube
- published on: 2018-02-11
- tags: security, cryptography, ssl, tls
What protocol is used between a web server and its clients to establish trust? How do they negotiate and share the secret key? During the handshake process, how public key encryption algorithm is used and how private key encryption is used? In this video, you would find all these answers.
What is digital signature? - YouTube
- tags: security, cryptography
A digital signature is equivalent to a handwritten signature in paper, and a digital signature serves three basic purposes. Digital signature is commonly used for software distribution, financial transactions and other cases where it is important to detect forgery. Digital signatures are very popular with e-mail users.
In this video, I will talk about the digital, uses, and the whole process of creating and sending digitally signed document over the Internet.
Keep in mind, digital signature is not about encrypting document, just like paper-based signature.
Beware:
Public key encrypts, private key decrypts (encrypting)
Private key encrypts, public key decrypts (signing)
How does a public key verify a signature? - Stack Overflow
- tags: security, cryptography
Public key encrypts, private key decrypts (encrypting)
Private key encrypts, public key decrypts (signing)
Hashids - generate short unique ids from integers
- tags: javascript, ruby, go, java, lua, security
- github url
Generate short unique ids from integers. Use in url shortening or as unique ids.
ssl
SSL/TLS handshake Protocol - YouTube
- published on: 2018-02-11
- tags: security, cryptography, ssl, tls
What protocol is used between a web server and its clients to establish trust? How do they negotiate and share the secret key? During the handshake process, how public key encryption algorithm is used and how private key encryption is used? In this video, you would find all these answers.
storage
- tags: filesystem, cloud, storage
- github url
Gluster is a software defined distributed storage that can scale to several petabytes. It provides interfaces for object, block and file storage.
tls
SSL/TLS handshake Protocol - YouTube
- published on: 2018-02-11
- tags: security, cryptography, ssl, tls
What protocol is used between a web server and its clients to establish trust? How do they negotiate and share the secret key? During the handshake process, how public key encryption algorithm is used and how private key encryption is used? In this video, you would find all these answers.