“Tumblr has now confirmed it was hacked in a data breach from 2013, which affected a set of users “Email addresses and Passwords”, but Tumblr has refused to reveal how many people were affected. With the release of the data, for sale on The Real Deal darknet marketplace, it has now been confirmed tha…”— E-SUSHI, electronic-sushi.tumblr.com
“The same hacker who was selling the data of more than 164 million LinkedIn users last week now claims to have 360 million emails and passwords of MySpace users, which would be one of the largest leaks of passwords ever.”— Lorenzo Franceschi-Bicchierai, motherboard.vice.com
“The choice to use a NoSQL database is often based on hype, or a wrong assumption that relational databases cannot perform as well as a NoSQL database. Operational costs, as well as other stability and maturity concerns, are often overlooked by engineers when it comes to selecting a database.”— Yoav Abrahami, blog.wix.engineering
“Set up your own IPsec VPN server on Docker, with support for both IPsec/L2TP and IPsec/XAuth ("Cisco IPsec"). Based on Debian Jessie with Libreswan (IPsec VPN software) and xl2tpd (L2TP daemon).”— hwdsl2, github.com
“Both Peace and the one of the people behind LeakedSource said that there are 167 million accounts in the hacked database. Of those, around 117 million have both emails and encrypted passwords.”— Lorenzo Franceschi-Bicchierai, motherboard.vice.com
“Kafka provides the messaging backbone for building a new generation of distributed applications capable of handling billions of events and millions of transactions”— Heroku, heroku.com
“For every second of every day, Unsplash serves 360 high-res images and 120 API and web requests. More photos are viewed every week than over the entire first year of Unsplash.”— Luke Chesser, backstage.crew.co
“We didn’t yet know the full extent of our sync system issues, but one thing was crystal clear: we needed to scale. A lot.”— Christine Spang, nylas.com
“Our team knew the dangers and distractions of premature optimization, and figured the “easiest” way to shard was to avoid it for as long as possible.”— Christine Spang, nylas.com
“Building an email system requires efficiently managing a huge amount of information essentially from day one. Our sync system has more data for a single user than most startup’s database of everything. To date, nearly 150k accounts have been synced by the Nylas Cloud system, and our datastore grows…”— Christine Spang, nylas.com
“At Simon, we use Jenkins for continuous integration, but we also use it for much more than that. It functions as an asynchronous job queue, a workflow manager for our Elastic MapReduce job flows, a context for executing one-off long running scripts, a vehicle for continuous deployment, and more.”— Jason Davis, engineering.simondata.com
“This Dockerfile is used by the build pipeline to create a new Docker image upon pushing code to the repository. The built image will then be used to start a new service on an ECS cluster.”— Chris Barclay, blogs.aws.amazon.com
“Today, developers are increasingly turning to managed services for toolsets and infrastructure requirements — tasks traditionally managed by DevOps teams. AWS and other managed service providers have allowed for a dramatically simplified way of working, reducing complexity on the developer end and,…”— Andrey Akselrod, techcrunch.com
“A key mechanism to achieve this is to automate the management as much as possible, removing error prone, manual operations.”— Werner Vogels, allthingsdistributed.com
“A service called fail2ban can mitigate this problem (edit: SSH being public) by creating rules that can automatically alter your iptables firewall configuration based on a predefined number of unsuccessful login attempts. This will allow your server to respond to illegitimate access attempts without…”— Justin Ellingwood, digitalocean.com
“Other than the excellent GenerateRandom API call (which you should check out for seeding your PRNGs), KMS is composed of a set of API operations for creating, managing, and using a relatively small set of encryption keys, called Customer Master Keys (here, "master keys"). There are a bunch of operat…”— Alex Schoof, blog.fugue.co
“Your AWS account is one of the most valuable things you own if you run a business on AWS. If you only own a single AWS account, you’re facing a serious security risk!”— cloudonaut, cloudonaut.io
“Docker allows you to package an application with all of its dependencies into a standardized unit for software development.”— Docker, docker.com
“It (edited: "Anisble") uses no agents and no additional custom security infrastructure, so it's easy to deploy - and most importantly, it uses a very simple language (YAML, in the form of Ansible Playbooks) that allow you to describe your automation jobs in a way that approaches plain English.”— Red Hat, ansible.com
“CredStash is a very simple, easy to use credential management and distribution system that uses AWS Key Management Service (KMS) for key wrapping and master-key storage, and DynamoDB for credential storage and sharing.”— fugue, github.com