System Architecture

System Architecture

7447 bookmarks
Custom sorting
Hyperspace
Hyperspace
·hypercritical.co·
Hyperspace
Feed reader cache coherency with JMAP and RFC5005
Feed reader cache coherency with JMAP and RFC5005
RSS feed readers don’t work as well as they should. Today I’d like totalk about issues from an application and server developer viewpoint;I’ll save some thou...
·jamey.thesharps.us·
Feed reader cache coherency with JMAP and RFC5005
Debugging - Model Context Protocol
Debugging - Model Context Protocol
A comprehensive guide to debugging Model Context Protocol (MCP) integrations
·modelcontextprotocol.io·
Debugging - Model Context Protocol
List of 10 Types of Consensus Mechanism with Examples
List of 10 Types of Consensus Mechanism with Examples
Consensus Mechanisms are different ways to verify blockchain transactions by running it through multiple validators each of whom verifies…
·medium.com·
List of 10 Types of Consensus Mechanism with Examples
Grid Computing - GeeksforGeeks
Grid Computing - GeeksforGeeks
A Computer Science portal for geeks. It contains well written, well thought and well explained computer science and programming articles, quizzes and practice/competitive programming/company interview Questions.
·geeksforgeeks.org·
Grid Computing - GeeksforGeeks
Hacking Flux Paths: The Surprising Magnetic Bypass
Hacking Flux Paths: The Surprising Magnetic Bypass
If you think shorting a transformer’s winding means big sparks and fried wires: think again. In this educational video, titled The Magnetic Bypass, [Sam Ben-Yaakov] flips this assumption. By …
·hackaday.com·
Hacking Flux Paths: The Surprising Magnetic Bypass
Multitasker Or Many Monotaskers?
Multitasker Or Many Monotaskers?
In Al Williams’s marvelous rant he points out a number of the problems with speaking to computers. Obvious problems with voice control include things like multiple people talking over each other, d…
·hackaday.com·
Multitasker Or Many Monotaskers?
Take us to The Rivers
Take us to The Rivers
News rivers were a brilliant idea in the first place. Perhaps, now that at least one high-profile publisher has embraced them, the rest might follow. But first, some history, in the best chronologi…
·doc.searls.com·
Take us to The Rivers
The river of news
The river of news
Dave Winer is up to something important... again. He has been talking about wanting "rivers of news" -- that is, headlines stripped of the packaging...
·buzzmachine.com·
The river of news
Open-Source Random Numbers
Open-Source Random Numbers
Whether it’s a game of D&D or encrypting top-secret information, a wide array of methods are available for generating the needed random numbers with high enough entropy for their use case…
·hackaday.com·
Open-Source Random Numbers
When Imperfect Systems are Good, Actually: Bluesky’s Lossy Timelines
When Imperfect Systems are Good, Actually: Bluesky’s Lossy Timelines
By examining the limits of reasonable user behavior and embracing imperfection for users who go beyond it, we can continue to provide service that meets the expectations of users without sacrificing scalability of the system.
·jazco.dev·
When Imperfect Systems are Good, Actually: Bluesky’s Lossy Timelines
Introduction to VirtIO
Introduction to VirtIO
If you want to learn about the technical aspects of VirtIO, then this is the blog for you.
·blogs.oracle.com·
Introduction to VirtIO
Documenting Event-Driven Architecture with EventCatalog and David Boyne
Documenting Event-Driven Architecture with EventCatalog and David Boyne
If you're wondering on how to document Event-Driven Architecture, or you don't know that you should, I have something for you. We discussed with David Boyne, why data governance practices and documenting is essential on building maintainable and evolvable systems. David also showed us also how EventCatalog can help in that. Watch this hands-on webinar to learn more!
·architecture-weekly.com·
Documenting Event-Driven Architecture with EventCatalog and David Boyne
How should we control access to user data?
How should we control access to user data?
At some point in a startup’s lifecycle, they decide that they need to be ready to go public in 18 months, and a flurry of IPO-readiness activity kicks off. This strategy focuses on a company working on IPO readiness, which has identified a gap in their internal controls for managing access to their users’ data. It’s a company that wants to meaningfully improve their security posture around user data access, but which has had a number of failed security initiatives over the years.
·lethain.com·
How should we control access to user data?
Russian Morse Code
Russian Morse Code
How does Russian Morse code compare to International Morse Code? How hard would it be to switch from one to the other?
·johndcook.com·
Russian Morse Code