EP120: What do version numbers mean?

EP120: What do version numbers mean?

This week’s system design refresher: Concurrency Vs Parallelism! (Youtube video) What do version numbers mean? Looking for a Job? This Free AI Tool Can Get You More Interviews! Cybersecurity 101 in one picture What is k8s (Kubernetes)? SPONSOR US ✂️Cut your QA cycles down to minutes with automated testing (Sponsored)
͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­
Forwarded this email? Subscribe here for more

This week’s system design refresher:

  • Concurrency Vs Parallelism! (Youtube video)

  • What do version numbers mean?

  • Looking for a Job? This Free AI Tool Can Get You More Interviews!

  • Cybersecurity 101 in one picture

  • What is k8s (Kubernetes)?

  • SPONSOR US


✂️Cut your QA cycles down to minutes with automated testing (Sponsored)

Are slow test cycles bottlenecking your dev teams’ release velocity? With QA Wolf, your organization can run entire test suites in minutes for faster feedback and developer confidence to ship.

QA Wolf takes testing off your plate. They can get you:

The benefit? No more manual E2E testing. No more slow QA cycles. No more bugs reaching production.

With QA Wolf, Drata’s team of 80+ engineers achieved 4x more test cases and 86% faster QA cycles.

🌟Rated 4.8/5 on G2

Schedule a demo to learn more


Concurrency Vs Parallelism!


What do version numbers mean?

Semantic Versioning (SemVer) is a versioning scheme for software that aims to convey meaning about the underlying changes in a release.

diagram
  • SemVer uses a three-part version number: MAJOR.MINOR.PATCH.

    • MAJOR version: Incremented when there are incompatible API changes.

    • MINOR version: Incremented when functionality is added in a backward-compatible manner.

    • PATCH version: Incremented when backward-compatible bug fixes are made.

  • Example Workflow
    1 - Initial Development Phase
    Start with version 0.1.0.


    2 - First Stable Release
    Reach a stable release: 1.0.0.

    3 - Subsequent Changes
    Patch Release: A bug fix is needed for 1.0.0. Update to 1.0.1.

    Minor Release: A new, backward-compatible feature is added to 1.0.3. Update to 1.1.0.

    Major Release: A significant change that is not backward-compatible is introduced in 1.2.2. Update to 2.0.0.

    4 - Special Versions and Pre-releases
    Pre-release Versions: 1.0.0-alpha, 1.0.0-beta, 1.0.0-rc.1.
    Build Metadata: 1.0.0+20130313144700.


Latest articles

If you’re not a paid subscriber, here’s what you missed.

  1. A Crash Course on Distributed Systems

  2. A Crash Course in Database Scaling Strategies

  3. A Crash Course in Database Sharding

  4. A Crash Course on Microservice Communication Patterns

  5. A Crash Course on Cell-based Architecture

To receive all the full articles and support ByteByteGo, consider subscribing:


Looking for a Job? This Free AI Tool Can Get You More Interviews!

If you're looking for a job, you should check this out.

My good friend Eric Cheng and his team have built a fantastic AI tool called Jobright.ai that makes your job search much easier.

Here are some great features I wish I had when I was job hunting

Try Jobright for Free

  • Aggregates all jobs in one place (8 million in total / 400K new jobs daily)

  • Match you with the right opportunities where you are a standout candidate

  • Create customized resumes for each job in seconds.

  • Automatically suggest past colleagues or alumni who can help with referrals.

  • It's completely free right now


Cybersecurity 101 in one picture

Image preview
  1. Introduction to Cybersecurity

  2. The CIA Triad

  3. Common Cybersecurity Threats

  4. Basic Defense Mechanisms
    To combat these threats, several basic defense mechanisms are employed:

    • Firewalls: Network security devices that monitor and control incoming and outgoing network traffic.

    • Antivirus Software: Programs designed to detect and remove malware.

    • Encryption: The process of converting information into a code to prevent unauthorized access.

  5. Cybersecurity Frameworks


What is k8s (Kubernetes)?

k8s is a container orchestration system. It is used for container deployment and management. Its design is greatly impacted by Google’s internal system Borg.

graphical user interface, application

A k8s cluster consists of a set of worker machines, called nodes, that run containerized applications. Every cluster has at least one worker node.

The worker node(s) host the Pods that are the components of the application workload. The control plane manages the worker nodes and the Pods in the cluster. In production environments, the control plane usually runs across multiple computers and a cluster usually runs multiple nodes, providing fault-tolerance and high availability.

  • Control Plane Components

    1. API Server
    The API server talks to all the components in the k8s cluster. All the operations on pods are executed by talking to the API server.

    2. Scheduler
    The scheduler watches the workloads on pods and assigns loads on newly created pods.

    3. Controller Manager
    The controller manager runs the controllers, including Node Controller, Job Controller, EndpointSlice Controller, and ServiceAccount Controller.

    4. etcd
    etcd is a key-value store used as Kubernetes' backing store for all cluster data.\

  • Nodes


    1. Pods
    A pod is a group of containers and is the smallest unit that k8s administers. Pods have a single IP address applied to every container within the pod.

    2. Kubelet
    An agent that runs on each node in the cluster. It ensures containers are running in a Pod.

    3. Kube Proxy
    kube-proxy is a network proxy that runs on each node in your cluster. It routes traffic coming into a node from the service. It forwards requests for work to the correct containers.


SPONSOR US

Get your product in front of more than 500,000 tech professionals.

Our newsletter puts your products and services directly in front of an audience that matters - hundreds of thousands of engineering leaders and senior engineers - who have influence over significant tech decisions and big purchases.

Space Fills Up Fast - Reserve Today

Ad spots typically sell out about 4 weeks in advance. To ensure your ad reaches this influential audience, reserve your space now by emailing hi@bytebytego.com

 
Like
Comment
Restack
 

© 2024 ByteByteGo
548 Market Street PMB 72296, San Francisco, CA 94104
Unsubscribe

Get the appStart writing


by "ByteByteGo" <bytebytego@substack.com> - 11:36 - 13 Jul 2024