Picture of a Google Coral USB device
Picture of a Google Coral USB device
The Coral USB Accelerator Edge TPU coprocessor

Like many people, I like to learn by doing and it is easier than ever to jump in and start experimenting with Machine Learning (ML). TinyML is becoming a popular way to get started with ML and one of the quickest ways is by using a Raspberry Pi. In addition to its low cost, the Pi’s GPIO pins and its camera options makes it easy to ingest data from a variety of sensors. The downside however, is the Pi is not that fast at ML as it currently lacks dedicated hardware for ML acceleration.

Google has a family of ML…


Unreal Engine Blueprint fading into a Fortnite screen.
Unreal Engine Blueprint fading into a Fortnite screen.

Epic Games has been in the news a lot recently over their battle with Apple and Google. As many of you have already heard, according to the press, Epic Games is trying to break the walled garden of the Apple App Store and Google Play Store, or perhaps, lower the 30% transaction fee they charge. However, I think there’s more at stake for Epic than simply being able to sell Fortnite directly to consumers while taking a little bit more of the profits.

If you have had a chance to use Epic Games’ Unreal Engine, you may have noticed a…


I recently dropped my freshman daughter off at her college dorm for the fall semester — in the age of COVID-19 the dorms are open, but the classes are all online. Like many dorms, the entrances to the halls had locks, as well as the individual dorm rooms. Just because you can get into the dorm, doesn’t mean you can get into every room. This setup got me thinking about Zero Trust and service meshes for microservices running in Kubernetes.

Microservices provide a number of benefits including independent scaling, business logic isolation, independent lifecycle management, and easier distributed development. These…


Spaceship shooting aliens.
Spaceship shooting aliens.

Introduction

Ever since I read about Netflix’s Chaos Monkey, I’ve been intrigued by the idea of chaos testing Kubernetes-based systems. The best way I’ve seen chaos testing explained is to imagine a monkey running through a data center, pulling out wires and pushing buttons — essentially causing chaos.

Chaos testing seeks to emulate this mayhem in a running system to see if it can recover, and if not, figure out why and then refactor the system to handle the errors. Without chaos testing, it’s difficult to determine if your system can recover from random errors and outages.

I work at ManTech…


I once had a manager who said “Ask the second question”. When I would ask one of my daughters “Is your homework done?”, I would invariably get a “Yes”. Then I would ask the second question “So it’s ready to be turned in as is?”, and the usual response was something like “Well, I have one more thing to finish”. One question is never enough, the first answer is usually what the person being questioned wants you, or themselves, to believe.

I was recently talking to a Red Hat architect about microservices and OpenShift, and during that conversation Quarkus came…


A pocket watch
A pocket watch

For a while now, I’ve been curious about what impacts running a service mesh will have on the performance of my software. I’ve spoken with vendors who have estimated around a 10% performance hit, but I wanted to see for myself the actual impacts. Actually, it’s not just to satisfy my own curiosity, I’ve also had customers ask what the runtime penalty is, and would I recommend they run a service mesh. Some of our customers run real-time systems and so this is an important question to be able to answer for them.

Istio provides a lot of value for…


Introduction

Trusting your runtime containers is crucial for widespread adoption of containers for both new systems and legacy migrations into a containerized environment. Having a secure supply chain and understanding the provenance have your container images can go a long way reducing security concerns, but it is equally important does its own security validation by looking for vulnerabilities and remediating them when found. One of the ways this can be accomplished is by the introduction of automated scanning and remediation tools into your CI/CD pipeline. There are number of good container image scanning tools including Prisma Cloud (formerly Twistlock), Anchore, and…


When talking to customers about microservices, one of the concerns I frequently hear is how to handle legacy application migration. Organizations need clear and easy paths to migrate their existing functionality into a service mesh. Because the universe of legacy systems is so varied, including monolithic custom middleware, databases, web servers, etc., this article will focus on API gateways and RESTful services because they can take advantage of many of the features of a service mesh.

In my previous article, I showed how to build and deploy a simple Java Spring Boot-based microservice into Istio. In this article, I will…


Microservice architectures are experiencing a surge of popularity and with the release of Service Mesh frameworks like Istio, they should be easier to manage and secure in the long run. One of the needs I have seen from our customers is converting their existing monolithic applications into microservices and running in a service mesh. There are patterns for migrating to microservcies, such as the strangler pattern, but getting the microservcies into an Istio service mesh can be a daunting task. A lot of monolithic applications are written in Java and using Spring Boot can be a quick way to extract…

Paul Klinker

Paul is a Principal Engineer at ManTech specializing in DevOps and enterprise software development.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store