System Architecture

System Architecture

7619 bookmarks
Custom sorting
How Exchanges Turn Order Books into Distributed Logs
How Exchanges Turn Order Books into Distributed Logs
Every modern exchange is a distributed database in disguise. This article reveals how trading engines transform chaotic streams of buy and sell orders into a perfectly ordered, replayable log, ensuring fairness, determinism, and market data reliability.
·quant.engineering·
How Exchanges Turn Order Books into Distributed Logs
Building Trustworthy AI Agents - Schneier on Security
Building Trustworthy AI Agents - Schneier on Security
The promise of personal AI assistants rests on a dangerous assumption: that we can trust systems we haven’t made trustworthy. We can’t. And today’s versions are failing us in predictable ways: pushing us to do things against our own best interests, gaslighting us with doubt about things we are or that we know, and being unable to distinguish between who we are and who we have been. They struggle with incomplete, inaccurate, and partial context: with no standard way to move toward accuracy, no mechanism to correct sources of error, and no accountability when wrong information leads to bad decisions...
·schneier.com·
Building Trustworthy AI Agents - Schneier on Security
Building the Weir Language
Building the Weir Language
A domain-specific language for describing patterns in natural language.
·elijahpotter.dev·
Building the Weir Language
Firecracker Virtualization Overview
Firecracker Virtualization Overview
Firecracker is an open source virtualization technology created by Amazon Web Services (AWS) which underpins their AWS Lambda Functions as a Service (FaaS) serverless product.
·bacchi.org·
Firecracker Virtualization Overview
How ProcessTree Saved My Async Tests
How ProcessTree Saved My Async Tests
This post is about the trap I hit while mocking API calls in Elixir tests, why it happened, and how ProcessTree solved it beautifully.
·mimiquate.com·
How ProcessTree Saved My Async Tests
Dropbox: Knowledge Graphs, Prompt Optimizers, and MCPs
Dropbox: Knowledge Graphs, Prompt Optimizers, and MCPs
Production RAG requires architectural decisions most tutorials skip: whether to index, how to structure knowledge for complex retrieval, when prompt optimization compounds value, and solving tool sprawl before it kills performance. This session shows you the tradeoffs and implementations that separate demos from systems handling real user queries at scale.
·maven.com·
Dropbox: Knowledge Graphs, Prompt Optimizers, and MCPs
RFC 8152: CBOR Object Signing and Encryption (COSE)
RFC 8152: CBOR Object Signing and Encryption (COSE)
Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need for the ability to have basic security services defined for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.
·datatracker.ietf.org·
RFC 8152: CBOR Object Signing and Encryption (COSE)
RFC 8949: Concise Binary Object Representation (CBOR)
RFC 8949: Concise Binary Object Representation (CBOR)
The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack. This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.
Concise Binary Object Representation
·rfc-editor.org·
RFC 8949: Concise Binary Object Representation (CBOR)
You Want Microservices—But Do You Need Them? | Docker
You Want Microservices—But Do You Need Them? | Docker
Before you default to microservices, weigh hidden costs and consider a modular monolith or SOA. Learn when Docker delivers consistency and scale—without sprawl.
·docker.com·
You Want Microservices—But Do You Need Them? | Docker
The Rise And Fall of Abstraction
The Rise And Fall of Abstraction
Most animals see the world around them in pretty concrete terms.
·overcomingbias.com·
The Rise And Fall of Abstraction
What is DRM and how it works in Live Video Streaming
What is DRM and how it works in Live Video Streaming
In live video streaming, DRM is essential for safeguarding high-value content from being copied or shared without permission. It ensures that live broadcasts are delivered securely to the right audience, giving creators confidence that their content is protected.
·callaba.io·
What is DRM and how it works in Live Video Streaming
Map Type 'BPF_MAP_TYPE_HASH' - eBPF Docs
Map Type 'BPF_MAP_TYPE_HASH' - eBPF Docs
This page documents the 'BPF_MAP_TYPE_HASH' eBPF map type, including its definition, usage, program types that can use it, and examples.
·docs.ebpf.io·
Map Type 'BPF_MAP_TYPE_HASH' - eBPF Docs
The Fediverse and Content Creation: Monetization
The Fediverse and Content Creation: Monetization
Sure, we have open source, federated replacements for Instagram, Tiktok, and YouTube. How do we get creators to use this stuff? One consideration involves the ability to pay for things.
·deadsuperhero.com·
The Fediverse and Content Creation: Monetization
SPARC - Wikipedia
SPARC - Wikipedia
RISC instruction set architecture
·en.wikipedia.org·
SPARC - Wikipedia