No, neither "just install a tarball" nor "just install this docker image" count.
At WWDC24, we shared a session on embedded Swift, which is available on YouTube: https://www.youtube.com/watch?v=LqxbsADqDI4
More documentation on embedded Swift tooling here: https://github.com/swiftlang/swift/blob/main/docs/EmbeddedSw...
(Disclosure: I work at Apple.)
Airfares have dropped precipitously over the last fifty years: https://simpleflying.com/50-years-airfares/, and it's quite possible that the trend will continue.
Conversely, the speed of commercial flight has barely changed over that time (with the exception of longer flights reducing stops). Boom is innovating in this area and bringing supersonic flight within reach again -- I for one think that's something to be celebrated.
- How do I enforce that inbound API requests come only from trusted sources?
- How do I enforce fine-grained access to user records?
- How do I enforce a set of naming conventions for a data update?
Many such policies may come from regulatory requirements, may be regional in nature, and may change in otherwise stable codebases. And it's even harder when you're applying this to a highly-scalable production internet service. As a result, defining policy at an organizational level with auditing is a challenge for large enterprises. OPA helps enterprises administer and enforce policies.
More details on what OPA does here: https://www.openpolicyagent.org/docs/philosophy
And you can see some examples of Rego (the policy language) here: https://play.openpolicyagent.org