Posts Categorized Under

Security & Compliance

  1. The Next-Generation Cloud CMDB: Ludwig Code

    A CMDB for APIs is a crucial aspect of Fugue, and one area where running your operations with Fugue offers a lot of value to you. Fugue's CMDB is an effect of our declarative model for configuration, built around our typesafe, compiled Ludwig language. Once it is run as a process in Fugue, that declaration is made real and immutable with machine precision.

  2. Why We Built Ludwig — a DSL for the Cloud of Today and the Future

    Fugue uses a new domain-specific language, Ludwig, to describe infrastructure configuration. Before we started building, we looked around for what we wanted, but didn't find it all in one place. We want typical things you do in cloud to be easy, and not feel like programming. We want users to get great error messages, fast. We want a program that compiles to almost always work in the cloud. We want sophisticated work to be possible, but safe, predictable, and shareable.

  3. Computing Cryptographic Hashes for Cyclic Dependencies

    Implementation of cryptographic hashes is theoretically not that hard, given a good cryptographic library. However, things get trickier when we want to allow dependency cycles. At that point, we get a bit of a chicken-and-egg problem. We need resource A’s hash to compute resource B’s hash, but that in turn depends on B’s hash again! Let's study the problem and solve it.

  4. Immutable Infrastructure: Networks

    If you work with network infrastructure, you know that it has a tendency to drift away from its original configuration, or "grow warts." There are many tools that attempt to solve this problem. Fugue brings automation and control of networks one step further by ensuring networks remain in the state intended when they were deployed.

  5. Cybersecurity's New Frontier

    The exterior walls of Luminal’s downtown Frederick headquarters are made of brick. But the company isn’t focused on walls. Its software aims to make a computer system more secure from the inside, instead of relying only on exterior defenses.

  6. Software Agents are a Vulnerability

    The agent/server model is another example of expanding the vulnerability surface in computing that has already shown itself to be far too large and permeable. The only solutions that will improve security and automation will avoid use of the agent/server model and should have no routable address space between them.

Take Control of Your Cloud Today

You and your team can be productive with Fugue on AWS in less than an hour, without the need for professional services.