Category: Software, Security, Data, Infrastructure

In the last episode, I’ve stumbled upon some reflections after a colleague’s statement. In this article, you will find this seed of thought explained in item 2.

Pull Requests (or ChangeLists, in the Google Engineering jargon) could introduce too many changes to a codebase at once.

At the security engineering arena, we are always trying to get more visibility over our infrastructure and architecture.

With good monitoring in place, it is possible to further analyze the characteristics of this traffic and determine the type and origin of the denial attack.

Related Articles