Posts

The Secret Life of Go: The 'defer' Statement

Image
  The Secret Life of Go: The 'defer' Statement # go # coding # programming # softwaredevelopment How to fix resource leaks and master Go's "Proximity Rule" Chapter 20: The Stacked Deck The fan on Ethan's desktop PC was spinning loudly. He was staring at a terminal that was spewing error messages like a broken fire hydrant. panic: too many open files panic: too many open files "I don't get it," he muttered, hitting Ctrl+C to kill the server. "I'm closing everything. I checked three times." Eleanor walked by, carrying a tray of tea. "Show me the  ExportData  function." Ethan pulled up the code. It was a long function, maybe 50 lines, that opened a file, queried a database, wrote to a CSV, and then uploaded it to S3. func ExportData ( id string ) error { f , err := os . Open ( "data.csv" ) if err != nil { return err } db , err := sql . Open ( "postgres" , ...

The Secret Life of AWS: The Sticker Shock (Cost Explorer & Budgets)

Image
  The Secret Life of AWS: The Sticker Shock (Cost Explorer & Budgets) # aws # finops # devops # cloud cloud Who left the lights on? How to track your spending with AWS Cost Explorer. Part 31 of The Secret Life of AWS Timothy was in a great mood. His application was running smoothly. The "Assembly Line" (Episode 29) was deploying updates automatically. The "Occupancy Limit" (Episode 30) had been raised. He opened his email and saw a notification from AWS. Subject: Your AWS Bill for January. He clicked it, expecting a small number. He froze. Total: $4,520.00 "Four thousand..." Timothy whispered, the color draining from his face. "Four thousand dollars?" He ran to Margaret’s desk. "Margaret! We've been hacked! Someone is running Bitcoin miners in my account! Look at this bill!" Margaret looked at the screen. She didn't gasp. She didn't scold him. She just adjusted her glasses. "We haven't been hacked, Timothy,...

The Secret Life of Azure: The Firewall That Forgot to Lock the Back Door

Image
  The Secret Life of Azure: The Firewall That Forgot to Lock the Back Door # azure # security # devops # cloud Mastering Network Security Groups and the importance of securing the paths you didn't know were open. Arc 2 — Resource Security & Governance The library was quiet as the evening sun moved across the floor. Margaret was standing at the chalkboard, where she had drawn a single rectangle labeled  Subnet . Inside the rectangle sat a smaller box labeled  Virtual Machine . "Timothy," Margaret said softly, "we have spent much time discussing who is allowed to enter the library. Today, we must discuss how we protect the individual rooms once someone is already inside". Timothy looked up from his notebook. "You are referring to the  Network Security Group , aren't you?" "I am," Margaret replied, nodding with a smile. "In Azure, the  Network Security Group , or  NSG , is the primary tool for filtering network traffic. It contains ...

Hedy Lamarr: The Hollywood Star Who Invented Frequency Hopping

Image
  Hedy Lamarr: The Hollywood Star Who Invented Frequency Hopping The overlooked inventor whose wartime idea powers WiFi, Bluetooth, and GPS today. When you think of Golden Age Hollywood stars, you think of glamour, studio lights, and dramatic performances. You don’t think of patent applications, spread‑spectrum technology, or the mathematical foundations of modern wireless communication. But Hedy Lamarr was never interested in what you were supposed to think. By day, she was MGM’s most stunning leading lady. By night, she was an inventor at a drafting table, sketching ideas that would eventually make WiFi, Bluetooth, and GPS possible. This is the story of how a self‑taught engineer disguised as a movie star invented technology decades ahead of its time—and how the world almost missed it entirely. How a Viennese Actress Became an Accidental Weapons Expert Before Hollywood, before the inventions, there was Hedwig Eva Maria Kiesler, a young actress in Vienna with a problem: she was ma...