#584 – July 21, 2024
Thousands of Windows machines were experiencing BSOD
Major Windows BSOD issue hits banks, airlines, and TV broadcasters
3 minutes
A faulty update from cybersecurity provider CrowdStrike is responsible for the global outage.
How authentication and authorization work together to secure applications
sponsored by Cerbos
While they are often spoken of as if they are the same thing, authorization and authentication are not interchangeable. They are, in fact, two distinct steps in the process of granting access to digital resources within an application. In this post, we examine authZ vs authN and explain how they work both separately and together to ensure least privilege access and resource protection.
Engineering Principles for Building Financial Systems
9 minutes by Wasteman
Best practices and principles to create accurate and reliable software based financial systems.
Advanced Terminal Tips and Tricks
6 minutes by Daniel Kleinstein
After more than a decade in CLI environments, I still find myself constantly learning new features and fun facts. I wanted to share some things I learned at relatively late stages in the game that ended up being significant productivity boosters for me.
How Canva collects 25 billion events per day
10 minutes by Long Nguyen
The architecture of Canva’s product analytics event delivery pipeline.
The Rise and Fall of the Blue-Collar Developers
15 minutes by Tamas Csizmadia
The AI Boom revolutionized the software industry by automating repetitive tasks and enhancing skilled developers’ efficiency. However, it also led to layoffs for less efficient developers. Rather than viewing this as the end, consider it a fresh start. Adaptability and resilience are crucial in this new era of software development.