《道德经》译文精简版

第一章 道可道(可以语言交流的道), 非常道(非真正意义上的道); 名可名(可以明确定义的名), 非常名(非真正意义上的名)。 无名天地之始(天地在开始时并无名称), 有名万物之母(名只是为了万物的归属)。 故常无欲以观其妙(因此常用无意识以发现其奥妙), 常有欲以观其徼(常用有意识以归属其范围)。 两者同出异名(两种思维模式同出自一个地方但概念却不相同), 同谓玄之又玄(这就是玄之又玄的玄关窍)。 众妙之门(它是打开一切奥妙的不二法门)。 ...

42 min · 20699 words · Joey

Build - The first pillar

What is Build? The Build pillar addresses the use of feature flags for building and delivering new features, bug fixes, and code changes of any kind. While much of this category deals with release management, we’ve named it “Build” because of the critical role feature flags also play in pre-release activities. Such activities might include trunk-based development, testing in production, and rollout planning. Traditional software development is reactive: teams push code and pray things go well. Build offers a proactive approach, wherein developers test features in production and collect user feedback before a release. This implies making feature flags an essential part of your release strategy. ...

13 min · 6212 words · Joey

bypass chrome Your connection isn't private

How to Bypass Google Chrome show “Your connection isn’t private” step 1. Click a blank section of the denial page. step 2. Using your keyboard, type thisisunsafe. This will add the website to a safe list, where you should not be prompted again.

1 min · 43 words · Joey

Empower - The fourth pillar

What is Empower? Empower, the fourth and final pillar of feature management, reimagines the process of giving users access to your software. It applies especially, though not exclusively to managing entitlements. In a software context, “entitlements” refers to the act of enabling or disabling features, services, and products for customers. For example, when you unlock your full application for a customer who had previously been using an abbreviated trial version, you have managed an entitlement. ...

13 min · 6457 words · Joey

Google I/O connection 2024

进场 Google Cloud 最新动态 在GoogleCloud上用Gemini构建web应用 使用数据库构建生成式AI应用 午餐 使用Ray 超越RAG Firebase

1 min · 62 words · Joey

Hexagonal architecture pattern

Intent The hexagonal architecture pattern, which is also known as the ports and adapters pattern, was proposed by Dr. Alistair Cockburn in 2005. It aims to create loosely coupled architectures where application components can be tested independently, with no dependencies on data stores or user interfaces (UIs). This pattern helps prevent technology lock-in of data stores and UIs. This makes it easier to change the technology stack over time, with limited or no impact to business logic. In this loosely coupled architecture, the application communicates with external components over interfaces called ports, and uses adapters to translate the technical exchanges with these components. ...

8 min · 1515 words · Joey

Improving flag usage in code

Improving flag usage in code Read time: 10 minutes Last edited: Sep 18, 2024 Overview This guide provides best practices and suggestions for improving code that uses feature flags. These practices can improve both code quality and ease of maintenance. You can use code in tandem with your feature flags to maintain and improve the resilience of your process, including improving flag hygiene, giving your team more flexibility, refactoring flagged code to the degree that you need and no further, and generally increasing code quality. ...

13 min · 6129 words · Joey

Istio Error Flag

HTTP and TCP Long name Short name Description NoHealthyUpstream UH No healthy upstream hosts in upstream cluster in addition to 503 response code. UpstreamConnectionFailure UF Upstream connection failure in addition to 503 response code. UpstreamOverflow UO Upstream overflow (circuit breaking ) in addition to 503 response code. NoRouteFound NR No route configured for a given request in addition to 404 response code or no matching filter chain for a downstream connection. UpstreamRetryLimitExceeded URX The request was rejected because the upstream retry limit (HTTP) or maximum connect attempts (TCP) was reached. NoClusterFound NC Upstream cluster not found. DurationTimeout DT When a request or connection exceeded max_connection_duration or max_downstream_connection_duration . HTTP only ...

2 min · 351 words · Joey

LaunchDarkly’s vision of feature management

Software powers the world. LaunchDarkly empowers all teams to deliver and control their software. Theoretically, teams can engage in all four pillars of feature management without relying on a dedicated feature management tool. In many cases, engineers will construct a patchwork solution for feature flag management in-house. Some organizations, however, do build and use world-class homegrown systems. But in our experience, the latter is the exception. Unsurprisingly, LaunchDarkly contends that, in the long-run, a commercial feature management platform is more affordable, sustainable, and painless than the alternative. You can explore the pros and cons of building vs. buying a feature management solution here . ...

5 min · 2275 words · Joey

Learn - The third pillar

What is Learn? The Learn pillar of feature management focuses on enabling all teams to better understand how software changes affect users and systems. It is designed for the entire product delivery team: developers , DevOps and site reliability engineers (SREs) , and product managers (PMs). Of all the pillars, Learn is especially concerned with helping software orgs become more data-driven. As a part of this, it provides mechanisms for engaging in hypothesis-driven development, an approach that embeds the scientific method and experimentation into the process of building software. In this way, Learn also supports the “relentless pursuit of continuous improvement,” a key principle of Continuous Delivery . ...

15 min · 7492 words · Joey