Meeting Mood is released
Distributed consensus hand signals for online meetings
Connecting to Yggdrasil
Building end-to-end encrypted IPv6 networks for fun
Data-Free Data Engineering
A manifesto for data-free data engineering
Kafka Connect Healthchecks
Imagine you have to run Kafka Connect behind a load balancer. Imagine further that that load balancer is incapable of handling basic authentication for health checks, and that this is required for monitoring reasons. That is exactly the position we found ourselves in this week, and this blog post covers how we solved it.
Berlin Buzzwords 2019
A review of some of the talks from the 10th edition of Berlin Buzzwords
Vault SSH With OTP
Let's configure SSH authentication with Hashicorp's Vault using the OTP method, find out why you would use this instead of the signed keys method, and whether Vault's SSH Engine is even what you are looking for.
Distributing Twine stories for offline usage with Progressive Web Apps
We took a look at the most minimal effort possible in order to get offline support for Twine stories across multiple platforms. This ended up being a Progressive Web App with Service Workers caching assets.
Twelve-Factor Apps, Sidecars, and Big Data
Heroku's twelve-factor methodology is a way of designing web applications that are portable across environments and different cloud providers. Sidecars are a design pattern which make applications more portable within your own infrastructure. Both of these can be applied to the Big Data world and we have a lot we can learn from them.
Big Data Technology Warsaw Summit 2018
A report from Big Data Technology Warsaw Summit 2018
The Damhof Four Quadrant Model And Recognition of Shadow IT In Data
The Damhof Four Quadrant Model describes the ideal data flows in a Business Intelligence process, and recognising and working with the Shadow IT components is really important for the success of your business