Microservices, Amazon Titan and More.
Welcome to the Inaugural edition of “Tech??vara”.
This is a fortnightly update on the latest?technology trends
Over the years several key?technology trends have stood the test of time and have gradually become the de-facto standard in their field. This week you can expect
So, let's dive in!
The Basics: The advent of the Internet and the exponential scale up of volume and complexity of Internet scale applications rendered several traditional approaches in?technology obsolete. The monolith architecture was one such artifact that gave way to a decomposed architecture
领英推荐
While there is no standard that covers Microservices architecture, The article by Martin Fowler listed above and the book - Microservices Design Pattern (along with its author site) are the most definite sources on this topic. We will cover the key design patterns for Microservices architecture in the upcoming parts of this series.
The Basics: The Software Supply chain attack has fast emerged as a key vector for security breach in recent times. This attack is executed by compromising a common library or system that is indirectly used by organizations.
A widely reported example of this is the SolarWinds breach?that impacted reputed organizations like Microsoft, FireEye, the Pentagon, Homeland Security, and went undetected for months. Other attacks include the Log4J compromise. SDKs/Libraries are especially vulnerable to such attacks due to their large install base and dependence on third party libraries that may not always be detected.
We recommend using tools such as Dependabot?and Bandit?to scan your code for security vulnerabilities
With the Generative AI space heating up it was only a matter of time before AWS jumps in with its own foundational model. That’s exactly what they did with their announcement of Titan.
Titan Text focused on summarization and text generation