XDG Desktop Portal - ArchWiki
System Architecture
Probabilistic Software Engineering Explained
How building software with AI agents is reshaping engineering, moving from deterministic coding to probabilistic, agent-driven development.
Abdul Rahman Sibahi | The Unbearable Frustration of Figuring Out APIs
or: Writing a Translation Command Line Tool in Swift.
Resources for the Personal Web: A Follow-Up Guide
A guide to tools and resources for joining the independent web movement. Discover blogging platforms like Pika, search engines that prioritize small sites, directories for finding like-minded creators, and more.
Breakwater – Sell access to your Docker containers
Secure container distribution for commercial software. License-aware auth, customer-specific credentials, and a hardened path from docker pull to paid delivery.
git/Documentation/gitdatamodel.adoc at master · git/git
Git Source Code Mirror - This is a publish-only repository but pull requests can be turned into patches to the mailing list via GitGitGadget (https://gitgitgadget.github.io/). Please follow Documen...
Semantics beyond the tag name - HTMHell
A collection of bad practices in HTML, copied from real websites.
Viable Systems: How To Build a Fully Autonomous Agent
Gnutella2 - Wikipedia
the P2P file sharing Network
Open music model - Wikipedia
economic and technological framework which foresees the playback of prerecorded music as a service
WebRTC - Wikipedia, the free encyclopedia
Kazaa - Wikipedia
Book "General-Purpose Visual Programming Language Pipe"
Book "General-Purpose Visual Programming Pipe"
A data model for Git (and other docs updates)
Toward a Proof of Concept for MyTerms
I’m thinking out loud here about how to get development rolling for MyTerms. Right now I see three pieces required for a proof of concept: Browser plugin Web (content management system, or CM…
Treating UI Regions as Independent Actors Makes Terminal State Manageable - Roland Rodriguez
How borrowing distributed systems patterns from Erlang creates maintainable, efficient terminal applications with independently managed regions.
io_uring for Systems Engineers
My former colleagues and I wrote a detailed paper^dbms to better understand io_uring. This post is a concise, high-level overview aimed at systems engineers: It should help you...
576 - Using LLMs at Oxide / RFD / Oxide
1 - Requests for Discussion / RFD / Oxide
Software Acceleration and Desynchronization
A look at the ever-present drive to make software delivery faster and how it might break down various activity loops in organizations.
Naftiko
Embrace your API legacy, integrate your AI future. Naftiko turns API sprawl into a governed capability fabric that teams can depend on.
Run Real Python in Browsers With Pyodide and WebAssembly
Pyodide compiles CPython to WebAssembly, letting developers run full Python directly in the browser without servers or installations.
What is Zero Trust? - Guide to Zero Trust Security | CrowdStrike
Zero Trust is a security framework requiring all users to be authenticated, authorized, and continuously validated before being granted access.
Memory Architecture for a Synthetic Being
The BEAM and the Crab: Building Tunnels
A deep dive into building an ngrok-like tunneling system using Elixir/Phoenix on the server and Rust for the CLI. We explore the challenges of multiplexing HTTP requests over a single WebSocket connection, the elegance of Phoenix Channels, and how the BEAM's real-time capabilities make this architecture surprisingly simple.
The Mythical Man-Month at 50
Fred Brooks's classic book The Mythical Man-Month was published 50 years ago. It was hugely influential on the then-nascent discipline of software development. How does it stand up today?
How Nx "pulled the rug" on us, a potential solution and lessons learned - Salvatore Zappalà's Weblog
Salvatore Zappalà's Weblog
The dangers of SSL certificates
Yesterday, the Bazel team at Google did not have a very Merry Boxing Day. An SSL certificate expired for and as shown in this screenshot from the github issue. This expired certificate apparently b…
Airtight SEAL - The Hacker Factor Blog
MongoBleed explained simply
CVE-2025-14847 allows attackers to read any arbitrary data from the database's heap memory. It affects all MongoDB versions since 2017, here's a simple explanation: