System Architecture

System Architecture

7620 bookmarks
Custom sorting
Gnutella2 - Wikipedia
Gnutella2 - Wikipedia
the P2P file sharing Network
·en.wikipedia.org·
Gnutella2 - Wikipedia
Open music model - Wikipedia
Open music model - Wikipedia
economic and technological framework which foresees the playback of prerecorded music as a service
·en.wikipedia.org·
Open music model - Wikipedia
Toward a Proof of Concept for MyTerms
Toward a Proof of Concept for MyTerms
I’m thinking out loud here about how to get development rolling for MyTerms. Right now I see three pieces required for a proof of concept: Browser plugin Web (content management system, or CM…
·doc.searls.com·
Toward a Proof of Concept for MyTerms
io_uring for Systems Engineers
io_uring for Systems Engineers
My former colleagues and I wrote a detailed paper^dbms to better understand io_uring. This post is a concise, high-level overview aimed at systems engineers: It should help you...
·toziegler.github.io·
io_uring for Systems Engineers
Software Acceleration and Desynchronization
Software Acceleration and Desynchronization
A look at the ever-present drive to make software delivery faster and how it might break down various activity loops in organizations.
·ferd.ca·
Software Acceleration and Desynchronization
Naftiko
Naftiko
Embrace your API legacy, integrate your AI future. Naftiko turns API sprawl into a governed capability fabric that teams can depend on.
·naftiko.io·
Naftiko
The BEAM and the Crab: Building Tunnels
The BEAM and the Crab: Building Tunnels
A deep dive into building an ngrok-like tunneling system using Elixir/Phoenix on the server and Rust for the CLI. We explore the challenges of multiplexing HTTP requests over a single WebSocket connection, the elegance of Phoenix Channels, and how the BEAM's real-time capabilities make this architecture surprisingly simple.
·acaor.com·
The BEAM and the Crab: Building Tunnels
The Mythical Man-Month at 50
The Mythical Man-Month at 50
Fred Brooks's classic book The Mythical Man-Month was published 50 years ago. It was hugely influential on the then-nascent discipline of software development. How does it stand up today?
·kieranpotts.com·
The Mythical Man-Month at 50
The dangers of SSL certificates
The dangers of SSL certificates
Yesterday, the Bazel team at Google did not have a very Merry Boxing Day. An SSL certificate expired for and as shown in this screenshot from the github issue. This expired certificate apparently b…
·surfingcomplexity.blog·
The dangers of SSL certificates
MongoBleed explained simply
MongoBleed explained simply
CVE-2025-14847 allows attackers to read any arbitrary data from the database's heap memory. It affects all MongoDB versions since 2017, here's a simple explanation:
·bigdata.2minutestreaming.com·
MongoBleed explained simply
JSON-complete data formats and programming languages
JSON-complete data formats and programming languages
Much of the data on the Internet is shared using a simple format called JSON. JSON is made of two composite types (arrays and key-value maps) and a small number of primitive types (64-bit floating-point numbers, strings, null, Booleans). That JSON became ubiquitous despite its simplicity is telling. { "name": "Nova Starlight", "age": 28, "powers": … Continue reading JSON-complete data formats and programming languages
·lemire.me·
JSON-complete data formats and programming languages
Censorship Explained: Shadowsocks
Censorship Explained: Shadowsocks
In the early 2010s, a simple tool thrown together by a lone programmer ignited an explosion of anti-censorship activity. Over the next decade, that simple tool–Shadowsocks–spawned a vast ecosystem of tools and techniques, developed by thousands and relied on by millions. We’ll need a firm grasp on how Shadowsocks works under the hood to better […]
·wallpunch.net·
Censorship Explained: Shadowsocks
Beyond Abstractions - A Theory of Interfaces
Beyond Abstractions - A Theory of Interfaces
This article aims to express the mental model that I have built over the last few years for thinking about human-computer interfaces, software, and how we might produce a step-function increase in building and using software. A new way to program, if you will. Note that this is more of a mental-model/philosophy than a falsifiable scientific theory, and not fundamentally novel. For many years I have been searching for an idea to work on within software that is deep, impactful, personally fulfilling, and one that enables a massive business to be built on top of it.
·bloeys.com·
Beyond Abstractions - A Theory of Interfaces
The Linux kernel is just a program
The Linux kernel is just a program
Most books and courses introduce Linux through shell commands, leaving the kernel as a mysterious black box doing magic behind the scenes. In this post, we will run some experiments to demystify it: the Linux kernel is just a binary that you can build and run.
·serversfor.dev·
The Linux kernel is just a program
Linux cgroup from first principles
Linux cgroup from first principles
After having spent the better part of 2 weeks learning Linux’s cgroup (control group) concept, I thought I better write this down for the next brave soul. 🦸
·fzakaria.com·
Linux cgroup from first principles