Securing Host Endpoints With Project Calico — Part 2
https://blog.tigera.io/securing-host-endpoints-with-project-calico-part-2-1e773e56c92d
https://blog.tigera.io/securing-host-endpoints-with-project-calico-part-2-1e773e56c92d
Tigera
Securing Host Endpoints With Project Calico — Part 2
I read about “The Law of Leaky Abstractions”, famously coined by Joel Spolsky in 2002, when I was still a young programmer. The wisdom…