No Image

MySQL Shell AdminAPI – What’s new in 8.0.21?

2020-07-17 KENNETH 0

MySQL Shell AdminAPI – What’s new in 8.0.21? The MySQL Development Team is happy to announce a new 8.0 Maintenance Release of MySQL Shell AdminAPI – 8.0.21! As always, we have listened to the growing community of users and introduced a very useful feature for any production deployment of MySQL InnoDB cluster or ReplicaSet.… Facebook Twitter LinkedIn Source: MySQL Shell AdminAPI – What’s new in 8.0.21?

Phil Spencer on the future of gaming

2020-07-16 KENNETH 0

Phil Spencer on the future of gaming At Xbox, they’re listening to players, game developers, content creators and streamers. And based on that feedback, Phil Spencer, executive vice president of Gaming at Microsoft, has laid out a road map to the future of gaming and Xbox in a new blog post. “We’re building a future where you and your friends can play the deepest, most immersive and interactive games ever created across your Xbox console, PC and mobile devices,” he writes. Commitments include new technology to reduce hate speech and toxicity and empowering creators of diverse backgrounds to develop new stories. With Xbox Series X, all games will look and play best on the newest console – whether they come from Xbox Game Studios or publisher and developer partners. If you have or are considering Xbox Game Pass, note that [ more… ]

Agile Perimeter Security with NGINX App Protect

2020-07-16 KENNETH 0

Agile Perimeter Security with NGINX App Protect In the context of computer security, the perimeter is a conceptual line that establishes a “zone of trust” for applications and other infrastructure components inside it. In traditional infrastructure environments using a castle-and-moat approach, the perimeter separated the intranet (internal network) from the extranet or Internet. The intranet was presumed safe, and threat was assumed to come only from outside it. Security posture was rather static and consisted of establishing fortification around the intranet with packet inspection and access control measures. Over time, however, external attackers have found ways to circumvent security controls and compromise components in the intranet, or craft external attacks and make it look like their requests originate from within the perimeter – since the intranet was considered safe. This has motivated a change to a Zero Trust security model, where [ more… ]

No Image

AWS 클라이드 네이티브 기반 Twelve Factor 앱 개발 방법

2020-07-16 KENNETH 0

AWS 클라이드 네이티브 기반 Twelve Factor 앱 개발 방법 2012년 Heroku에서 일하던 개발자들은 클라우드 시대에 적합한 애플리케이션 개발과 배포 방법에 맞는 12가지 원칙(Twelve Factor)을 개념화 했습니다.  이와 비슷한 원칙 중 더 나은 코드를 위한 12가지 Joel Test라는 것도 유명하죠. Joel Test가 코드와 개발에 대한 것이라면 Twelve-Factor App 원칙의 주요 개발 동기는 아래와 같습니다. 애플리케이션 설정 자동화를 위한 절차(declarative)를 체계화 하여 신규 개발자의 학습 비용 절감 운영 체제에 따라 다른 부분을 정의하고, 배포 및 실행 환경 사이의 이식성 극대화 클라우드 플랫폼 배포에 적합하며, 서버와 배포 시스템 관리 최소화 개발 환경과 운영 환경의 차이를 최소화하고 민첩성을 위한 지속적인 배포 지향 개발 도구, 아키텍처, 개발 방식 변화 없이서비스 확장(scale up/out) 가능 이러한 12가지 원칙(Twelve Factor)을 기반으로, AWS 클라우드 기반으로 개별 서비스를 접목하는 솔루션이 없을까 고민했습니다. 아래 영상은 최근 클라우드 기술 동향과 새롭게 고려할 항목을 포함하여 전체를 관통하는 앱 현대화를 위한 패턴도 함께 소개합니다. [ more… ]

Announcing Windows 10 Insider Preview Build 20170

2020-07-16 KENNETH 0

Announcing Windows 10 Insider Preview Build 20170 Hello Windows Insiders, today we’re releasing Windows 10 Insider Preview Build 20170 to Windows Insiders in the Dev Channel. PLEASE NOTE: Windows Insiders with PCs that have AMD processors will not be offered this build today due to a bug impacting overall usability of these PCs. The issue should be fixed for the next flight. What’s new in Build 20170 Improving your Sound Settings experience Last week we mentioned we were planning on bringing more Control Panel capabilities forward into Settings, and here’s another one – we’re updating Settings > System > Sound > Manage sound devices to now let you know which device is default, and if not, enable you to set it as your default device or default communication device. We’ve also updated the volume mixer to include a link to [ more… ]