The Big Cap Theory Part 2

For part one, click here. You’ve almost definitely heard of the ACID principle in reference to RDBMS transactions, and that is predominantly where this is applied. The ACID principle has also managed to push its way into classic application design: dictating architectural choices that lead to archaic monolithic architectures.  It has also reached the limit […]

Continue reading
data flowing

The Big CAP Theory Part 1

What is the CAP Theorem? Everyone wants reliable applications, and for decades we’ve striven to achieve reliability by pushing the same old philosophies harder and harder. Often to their breaking point. Finding that it’s often more costly and difficult to make gains as we push closer and closer to our goal. As if cost and […]

Continue reading

House of Codes part 2 of 2

This post is the second and final piece in this series.  To read the first, click here. We have seen a lot of movement in the direction of Continuous Integration (CI) and Continuous Development (CD) [CI/CD] in our industry.  It is still making its way into all aspects of software but, in my opinion, will […]

Continue reading

House of Codes Part 1 of 2

Just like all other standards and laws, forcing IT to come up with standards industry-wide will come when the “cost” is too high to ignore and someone is made a political scapegoat.  Is this scapegoat Equifax? In IT we use frameworks and libraries to streamline reusable work.  It is like the plumbing industry  today.  The […]

Continue reading
Business man jumping from old PC to new laptop

Dr. Strangecode or: How Apple Needs to Stop Worrying and Love Open Source part 3 of 3

In my previous post, here, we discussed some of the ways that Apple might deal with some commonly anticipated issues like syncing multiple devices (MacBook Pro, iMac/Mac Pro, iPhone, iPad, and Apple TV) through delta packages. However, this raises questions pertaining to the age of a device and how to handle new devices. The first […]

Continue reading

Dr. Strangecode or: How Apple Needs to Stop Worrying and Love Open Source part 2 of 3

In a previous post, we discussed a possible avenue for Apple to securely sync data residing on iCloud, hypothetically. The architecture would look something like this: The workflow for passing this data is trivial yet complicated. The following sequence diagram shows such a workflow (see below). In this case, because we have the secure enclave […]

Continue reading