Traditionally, Linux Kernel distinguishes its processes with the following two categories:
Privileged Processes: These processes allow the user to bypass all Kernel permission checks.
Unprivileged Processes: These processes are subject to full permission checks, such as the effective UID, GID, and supplementary group list.
Linux based systems uses defined terminologies for different components of Processors.
Infrastructure-as-code provides a mechanism to apply changes to the system in a comprehensive manner so that the system reaches a desirable state.
HSTS is an opt-in security specified by a web application through the use of a special response header.
When the browser receives this header, the browser prevents all communication over HTTP to that specified domain. Instead the browser will send all communication over HTTPS.
Software Versioning makes it easy and convenient to track, test, deploy, patch and rollback features, enhancements and bug/fixes across variety of environments in Software Supply Chain.
Semantic Versioning provides an efficient and effective framework to version the software products, so that the infamous Dependency Hell can be avoided.
2016 saw 71% rise in Denial of Service attacks with biggest attack of 623 Gbps and mega attacks averaging around 100 Gbps. If unprepared, Denial of Service can result in Financial losses, Reputational Damage, Customer Attrition and Legal Pursuits.
Public cloud services are growing at 16% annually. Cloud services can be directly used by end-user or are integrated into third-party applications. Due to this heavy reliance on Cloud services, effective downtime communication becomes top priority for keeping customers happy, building trust and creating customer transperancy.
Apache Mesos abstracts CPU, memory, storage and other compute resources from machines(physical or virtual), providing resource management and scheduling across entire data centers and cloud environment.
From Iron Age(Bare Metal) Computing to Cloud Computing, Distributed Systems have played a vital role in processing and delivering information, but we are just getting started. We are set to enter Zetta Byte era with just 40% of total world population connected to Internet.
Since the inception of Internet, every technology giant is using aspects of Distributed Systems to achieve high availability and scalability in order to cater the ever growing service requests.