Source: Infracloud

A friend and I were talking about career paths recently and there was a lot of talk about DevOps and SRE. When I was first introduced to the two concepts a few years ago I often confused them, but unfortunately, no one was there to answer my confusion. Now it’s extremely popular, but I found that my friend still has some misconceptions about the two roles. So I’ve given some insights and put together an article to share with the public.

The most common misconceptions.


Source: Dev.to

Kubernetes dominate the container orchestration market, driving the evolution of enterprises to microservices. Each instance of a microservice generates numerous log events, which quickly become difficult to manage. But compounding this is the fact that when problems occur, the complex interactions between services and the failure modes make it difficult to find the root cause. The potential problems make Kubernetes log management tools very important.

Businesses are always trying to find the right tools to meet their needs and make monitoring, logging, and fault analysis efficient and fast.

Zebrium

You might give priority to Prometheus or ELK, but Zebrium can also…


Source: Logz.io

The emergence of Kubernetes has dominated the container orchestration market and strengthened the way operations used to be, blurring the boundary between development and operations and making the role of DevOps much clearer. It is one of the most popular container solutions available today.

Every software engineer can use Kubernetes to define the topology between services, the number of nodes on the line, resource usage and quickly implement horizontal scaling, blue-green deployments, and other complex operations of the past. Here is a list of tools to help you get the most out of Kubernetes.

Clustering deployment tools

Amazon EKS
Amazon Elastic Container Service is…


With the rapid popularization of AI technologies such as autonomous driving technology, smart assistants, face recognition, smart factories, and smart cities, and the rapid growth of related security incidents, consumers and the industry are paying more and more attention to AI cybersecurity issues and threats. Continuous improving.

Recently, at the request of the European Union and the US government, Adversa, a trusted AI research and consulting company, published the industry’s first comprehensive research report on the security and credibility of artificial intelligence. The report also combines Gartner’s relevant predictions and recent AI research reports. Of confrontational attacks.

Oliver Rochford, a…


Application software leaking user data has long been a common topic, but every time it is mentioned, I still have to feel the dangers that are difficult to prevent, especially when the scope of influence is too large and you may be a “victim”.

On the 20th of May, 2021, the network security company Check Point Research (hereinafter referred to as CPR) released a report: Because developers did not properly configure third-party cloud services, some popular Android applications leaked the personal data of more than 100 million users.

Photo by Denny Müller on Unsplash

Multiple misconfigurations

The CPR team said that by testing 23 applications, they found that…


The era of Adobe Flash Player has come to an end.

Photo by Przemyslaw Marczynski on Unsplash

Starting from January 1, 2021, Adobe officially stopped supporting Adobe Flash Player. Prior to this, including Microsoft Edge, Google Chrome, Mozilla Firefox, and Apple Safari, Flash had been eliminated before this date. Use other technologies instead.

Recently, Microsoft has launched another “killer” on the Windows system. This is bound to root out the poorly secured and low-performance Flash Player from its own products. …


Recently, the well-known analysis company SlashData, after surveying more than 19,000 developers in 155 countries/regions around the world, released the “Developer Report” (20th edition) for the first quarter of 2021. In this report, focusing on tools and fields such as programming languages, machine learning, emerging technologies, and embedded, analyze the application status of development tools and the latest development trends of the developer ecology.

Source: Slashdata

Highlights at a glance:

Programming language development prospects


The purpose of this article is to give you a detailed list of the learning route and important knowledge points of Python OpenCV. The core is divided into 24 small chunks, all of which are mastered.

Photo by Nguyen Dang Hoang Nhu on Unsplash

OpenCV first understanding and installation

In this part, you need to understand the related introduction of OpenCV (Open Source Computer Vision Library). OpenCV can run on multiple platforms. It is lightweight and efficient. It consists of a series of C functions and a small number of C++ classes. It provides Python, Ruby, MATLAB, etc. …


Recently, JetBrains announced that all its IntelliJ-based IDEs will stop supporting 32-bit operating systems, including AppCode, Clion, DataGrip, GoLand, IntelliJ IDEA, PhpStorm, PyCharm, Rider, RubyMine and WebStorm.

Original Photo by Miguel Á. Padriñán from Pexels

The main reason for giving up compatibility with 32-bit operating systems is that JetBrains has discovered that the number of users using Linux and Windows 32-bit operating systems has dropped significantly over the years, and they want to focus more on compatibility with the most commonly used operating systems. And emerging architectures, such as the AArch64 architecture, which is becoming more and more popular in the macOS field.

For all IntelliJ-based IDEs, the…


In the previous article, we have implemented the use of custom annotations to verify token information, so we will find that when we need to verify more interfaces, we need to add the @ JwtToken annotation to each method, which is also very troublesome. In this article, we continue to use interceptors to verify token information.

Photo by AltumCode on Unsplash

If you are not familiar with the integration of JWT, you can take a look at my article: Integrate JWT in SpringBoot to achieve Token verification (Integration)

If you are interested in custom annotation verification token information, you can check out my article: Integrate…

Shingai Zivuku

Can read and write!

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store