Home | Swim Developer
System Architecture
Package Forge
Improving Package Management & Security for Linux systems. (Dev: @pkgforge-dev | Communtity: @pkgforge-community | Security Research: @pkgforge-security) - Package Forge
How Exchanges Turn Order Books into Distributed Logs
Every modern exchange is a distributed database in disguise. This article reveals how trading engines transform chaotic streams of buy and sell orders into a perfectly ordered, replayable log, ensuring fairness, determinism, and market data reliability.
SecureThought - dn on AI and tech
Building Trustworthy AI Agents - Schneier on Security
The promise of personal AI assistants rests on a dangerous assumption: that we can trust systems we haven’t made trustworthy. We can’t. And today’s versions are failing us in predictable ways: pushing us to do things against our own best interests, gaslighting us with doubt about things we are or that we know, and being unable to distinguish between who we are and who we have been. They struggle with incomplete, inaccurate, and partial context: with no standard way to move toward accuracy, no mechanism to correct sources of error, and no accountability when wrong information leads to bad decisions...
Building the Weir Language
A domain-specific language for describing patterns in natural language.
Firecracker Virtualization Overview
Firecracker is an open source virtualization technology created by Amazon Web Services (AWS) which underpins their AWS Lambda Functions as a Service (FaaS) serverless product.
How ProcessTree Saved My Async Tests
This post is about the trap I hit while mocking API calls in Elixir tests, why it happened, and how ProcessTree solved it beautifully.
Addressing Linux's missing PKI infrastructure
Jon Seager, VP of engineering for Canonical, has announced a plan to develop a universal Public [...]
Dropbox: Knowledge Graphs, Prompt Optimizers, and MCPs
Production RAG requires architectural decisions most tutorials skip: whether to index, how to structure knowledge for complex retrieval, when prompt optimization compounds value, and solving tool sprawl before it kills performance. This session shows you the tradeoffs and implementations that separate demos from systems handling real user queries at scale.
Avoiding Bias: Applying Schneier’s Law to Systems Design
Naturally, working alone or even as a close-knit group, it’s easy to create a design or implementation that we think is flawless.
Distributed ID Formats Are Architectural Commitments, Not Just Data Types
Why ID formats become long-term architectural commitments, and how UUID, ULID, Snowflake, and custom schemes compare.
pycose a Python implementation of CBOR Object Signing and Encryption — pycose 0.9 documentation
RFC 8152: CBOR Object Signing and Encryption (COSE)
Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.
RFC 8949: Concise Binary Object Representation (CBOR)
The Concise Binary Object Representation (CBOR) is a data format whose design
goals include the
possibility of extremely small code size, fairly small message size, and
extensibility without the
need for version negotiation. These design goals make it different from earlier
binary
serializations such as ASN.1 and MessagePack.
This document obsoletes RFC 7049, providing editorial improvements, new
details, and errata fixes while keeping full compatibility with
the interchange format of RFC 7049. It does not create a new version
of the format.
Concise Binary Object Representation
Best practices for examples in documentation
Best practices for examples in documentation. GitHub Gist: instantly share code, notes, and snippets.
You Want Microservices—But Do You Need Them? | Docker
Before you default to microservices, weigh hidden costs and consider a modular monolith or SOA. Learn when Docker delivers consistency and scale—without sprawl.
ULID: Universally Unique Lexicographically Sortable Identifier
Using ULID identifiers in Go programs running on Postgres database.
The Rise And Fall of Abstraction
Most animals see the world around them in pretty concrete terms.
Desugaring the Relationship Between Concrete and Abstract Syntax
Converting our CST into our AST and desugarging let expressions
What is DRM and how it works in Live Video Streaming
In live video streaming, DRM is essential for safeguarding high-value content from being copied or shared without permission. It ensures that live broadcasts are delivered securely to the right audience, giving creators confidence that their content is protected.
Digital rights management (DRM): The complete guide - Castlabs
Learn how DRM works for VOD, live, WebRTC, and offline. See OTT device coverage, key rotation, concurrency control, and player setup. Start a DRM trial.
Lazier Binary Decision Diagrams (BDDs) for set-theoretic types
This article explores the data structures used to represent set-theoretic types and the recent optimizations we have applied to them
Map Type 'BPF_MAP_TYPE_HASH' - eBPF Docs
This page documents the 'BPF_MAP_TYPE_HASH' eBPF map type, including its definition, usage, program types that can use it, and examples.
The Fediverse and Content Creation: Monetization
Sure, we have open source, federated replacements for Instagram, Tiktok, and YouTube. How do we get creators to use this stuff? One consideration involves the ability to pay for things.
Ephemeral Infrastructure: Why Short-Lived is a Good Thing
What Does Ephemeral Mean?
9P (protocol) - Wikipedia
Plan 9 filesystem protocol
SPARC - Wikipedia
RISC instruction set architecture
UltraSPARC T1 - Wikipedia
microprocessor by Sun Microsystems
Single-chip Cloud Computer - Wikipedia
Intel's 48-core research chip