The Tech Caffeine #9
Learning from example - Well Documented Code, Tips to be a good IT Architect, SRE Training, Ransomeware Mitigation Strategies and much more!
✳️ This Week’s Featured Articles ✳️
Writing Well-Documented Code - Learn from Examples
This article takes real-world code samples from Open Source codes and talks about the Code Documentation Best Practices. A joyful reading!
Do check out other articles from Code Catalog - “Learning from Open Source“
The container Incubator
This article from ANDREW LEONARD talks about Cloud Native Computing Foundation(CNCF)’s role in shaping containers’ ever-accelerating evolution.
If Kubernetes is a “glue” technology, then the CNCF is a “glue” organization.
If it were easy, we would not need good IT architects
This article from Anthony Langsworth provides some good tips to IT Architects on how to add value to the organization by influencing without having authority.
Selling an architecture or design and selling the value of an IT architect are related but different activities. Selling a design, for example, requires helping the customer meet their own goals more effectively. It happens periodically, usually once per project. It makes you authoritative for that project. Selling an IT architect role and understanding stakeholder needs are both ongoing, continuous processes.
I recently read the book “The Software Architect Elevator: Redefining the Architect's Role in the Digital Enterprise“. This book also emphasizes some of the things mentioned the article.
Tammy Bryant Butow on SRE Apprentices
Check out this Podcast with Tammy Bryant where she talks about training new Site Reliability Engineers.
Hiring new site reliability engineers can be challenging. Dropbox decided to create a program to teach a cohort of students the skills necessary to be successful SREs.
If interested, you can also check out Dropbox’s Career Framework for SREs.
Cloud Providers Publish Ransomware Mitigation Strategies
This is a collection of articles from various cloud providers sharing Ransomware Mitigation Strategies.
In ransomware events, files are encrypted and money is demanded, usually in cryptocurrencies, in exchange for the decryption key and for not releasing sensitive data. With an increased number of attacks reported in the news, the main cloud providers have released checklists and documentation to prevent and recover from ransomware while deploying on public cloud.
How Coinbase interviews for engineering roles
Coinbase is one the most popular sites to buy cryptocurrencies. In this article, they can talk about what they look for while hiring for engineering talent.
✳️ Noteworthy Course/Video ✳️
Ultimate AWS Certified Solutions Architect Associate 2021
What you'll learn
FULLY UPDATED FOR SAA-C02: Pass the AWS Certified Solutions Architect Associate Certification
All 600+ slides available as downloadable PDF
Perform Real-World Solution Architecture on AWS
Learn the AWS Fundamentals (EC2, ELB, ASG, RDS, ElastiCache, S3)
Learn the Serverless Fundamentals (Lambda, DynamoDB, Cognito, API Gateway)
Analyze 10+ Solution Architectures (traditional & serverless)
Understand the Well-Architected Framework, Disaster Recovery
Master all the differences of Databases on AWS
Secure your entire AWS Cloud using KMS, IAM Policies & SSM
✳️ Tweet of the week ✳️
✳️ Thank you for making it this far ✳️
If you enjoyed this newsletter, please share this with your friends & colleagues!
If you haven’t subscribed to this newsletter yet, then please do -
This newsletter was proofread by Grammarly