Monday, March 23, 2020

Prisoner of Darkness, Galaxy's Edge book 6 by Jason Anspach and Nick Cole


I am not enjoying how the story line is shifting away from space opera towards fantasy but the close combat is still great, 3/5 Stars.

Sunday, March 22, 2020

Asymptomatic Transmission?

The role of delayed and asymptomatic transmission is still unclear with errors larger than our results.  Massive testing is needed to understand what is really happening.

Friday, March 20, 2020

effective COVID-19 therapy


I feel compelled to contribute to the noise, sorry!  ArsTech put out this fantastic, approachable write-up on how we shall treat the virus.  This peer reviewed paper on using malaria medications is getting lots of attention right now. Go Remisdir; go Chloroquine!


Thursday, March 19, 2020

Wednesday, March 18, 2020

3D model: how Remdesivir binds to SARS-CoV-2

https://www.youtube.com/watch?v=DKLLKP7pk0o


On March 6, when Gilead Sciences announced clinical trials of their anti-viral medication Remdesivir, I bought shares in their stock (and yes, it is up).  Coincidentally, one of my children had an assignment at University to model how the medication (Remdesivir) binds to SARS-CoV-2.

Here is the video.


Sunday, March 15, 2020

iter8 for A/B testing using istio, k8s

This approach to enable canary testing and A/B testing  looks very interesting.

interfaces in open infrastructure around kubernetes



Katie Gamanji takes us on a journey through the evolution of the open source tools ecosystem surrounding kubernetes, its past, present, and possible futures.

testing network code in a CI framework


If you have ever seen any of the Cloudflare talks about how Cloudflare hacked nginx and saved the Internet, you will have some idea of how difficult and complicated edge security policy really is.  Anomalies are legion and enormous.  The "bad actors" are brilliant, talented, persistent, and have huge resources available for attack.  How can the rest of us hope to defend ourselves and keep complicated network security policies from causing major outage or failing their primary purpose of defense?

Here, with step-by-step examples and demonstrations is one approach, using Calico.  However, the examples are simple and straightforward.  The real world is much-more complex.

early insights into our serverless and no-ops future


O'Reilly's serverless survey is not very very scientific.  And all respondents are self-selected serverless enthusiasts.  But there are some good cautionary data about what is not working well.

DevSecOps analysis by Guy Podjarny


Guy writes an interesting analysis about how security concerns that were formerly specialized within a security team as companies like eBay have are getting pushed into the Developer function as modern cloud-native companies are organizing.