Attack Resistant Trust Metric Metadata HOWTO

System Architecture
Advogato - Wikipedia
EigenTrust - Wikipedia
Introducing Top Secret
Automatically filter sensitive information before sending it to external services or APIs, such as chatbots and LLMs.
TrekGuide.com =/\= Calculating Stardates and Calendar Dates
Explanation of Stardates and their relation to actual dates on Star Trek.
Tincat Group, Inc.—GIRLS and GIM Papers
Tincat Group, Inc. History of Computing, MultiValue GIRLS Papers.
Tincat Group, Inc.—Don Nelson's GIRLS User Requirements Specification, 1965
Tincat Group, Inc. Generalized Information Retrieval Language and System User Requirements Specification by Don Nelson 1965
Pick is a living fossil of computer history
This is the first part of a three-part look at the software I worked with at the start of my career.
History of Pick Reality
Reality, the original NoSQL, MultiValue Database SQL enabled for interoperability
HistoryOfMV - Pickwiki
Tales In Tech History: Pick Operating System
Best OS you never heard of? Pick OS was initially developed to manage spare parts for attack helicopter during Vietnam war
MultiValue database - Wikipedia
Pick operating system - Wikipedia
Case Study: Proactive IT Category Management Strategies to Ensure Business Alignment (IKEA)
Gartner Information Technology Research on Case Study: Proactive IT Category Management Strategies to Ensure Business Alignment (IKEA)
The secret taxonomy behind IKEA’s product names, from Billy to Poäng
Reading strange-sounding Swedish words is part of the joy of shopping at IKEA. Within the labyrinth of stylish flat pack furniture is a pänoply of ödd, åccented pröduct nämes, printed on hang tags, walls and banners. What most shoppers don’t know is that the names of those 12,000 products conform to a strict internal logic that offers a peek into Scandinavian culture.
Scalable System Design Patterns
System Design Refresher
Making Impossible States Impossible: Type-Safe Domain Modeling with Functional Dependency Injection
Learn how to use rich types, phantom types, and partial application to eliminate impossible states and implement Clean Architecture's dependency inversion in a functional way. Discover why the compiler is your best friend for building robust domain models.
Content Addressable Storage - namvdo's blog
If you’re working on a modern JavaScript application and use a build tool like Vite to build and deploy your code, you can open the dist folder and find out […]
FFMPEG assembly language lessons
The FFmpeg School of Assembly Language provides a first step on the most interesting, challenging, and rewarding journey in programming. The lessons give a grounding in the way assembly language is…
HTTP Headers to Build 10X APIs 🔥
#83: Break Into HTTP Headers (15 Minutes)
Codemia | The Evolution of Linux CPU Schedulers: From O(1) to CFS to User‑Space Scheduling
AppStream Report for AerynOS - Start
Filesystem Hierarchy Standard - Wikipedia, the free encyclopedia
Intuition behind Power of 2 Choices Load balancing | Amandeep Singh
Discover how power of two load balancing reduces hotspots, achieves O(log log n) max load, and connects to cuckoo hashing for efficiency.
The Case for MyTerms
We know more than we can tell. That was how Michael Polanyi distinguished between tacit and explicit knowing. We may know tacitly how we form speech, ride a bike, or sense when to shake hands with …
Codemia | NUMA Is the New Network: How Per-Socket Memory Models Are Reshaping Microservice Placement
Payment Processor Fun 2025 -- Making Your Own MSP
Introduction to VirtIO, Part 2: Vhost
An excellent detailed second blog on the subject of VirtIO, this time focusing on Vhost.
LLMs as Parts of Systems - Marc's Blog
Living with LLMs (2023 - 2025)
More than two years into the AI hype, here’s a grounded overview of this period from the perspective of a regular software developer.