System Architecture

System Architecture

7404 bookmarks
Custom sorting
File path formats on Windows systems - .NET
File path formats on Windows systems - .NET
In this article, learn about file path formats on Windows systems, such as traditional DOS paths, DOS device paths, and universal naming convention (UNC) paths.
·learn.microsoft.com·
File path formats on Windows systems - .NET
ZeroNet - Wikipedia
ZeroNet - Wikipedia
ZeroNet is a decentralized web-like network of peer-to-peer users, created by Tamas Kocsis in 2015, programming for the network was based in Budapest, Hungary; is built in Python; and is fully open source. Instead of having an IP address, sites are identified by a public key. The private key allows the owner of a site to sign and publish changes, which propagate through the network. Sites can be accessed through an ordinary web browser when using the ZeroNet application, which acts as a local webhost for such pages. In addition to using bitcoin cryptography, ZeroNet uses trackers from the BitTorrent network to negotiate connections between peers. ZeroNet is not anonymous by default, but it supports routing traffic through the Tor network.
·en.wikipedia.org·
ZeroNet - Wikipedia
pastagang
pastagang
jam code
·pastagang.cc·
pastagang
What is Twingate? | Tailscale
What is Twingate? | Tailscale
Compare two of 2025's top Virtual Private Network (VPN) solutions: Tailscale and Twingate.
·tailscale.com·
What is Twingate? | Tailscale
Start at the Beginning
Start at the Beginning
Website visitors shouldn't have to attempt to navigate back to where they wanted to go after logging in
·lyonheart.us·
Start at the Beginning
The case for sans-io
The case for sans-io
The most popular option to decompress ZIP files from the Rust programming language is a crate simply named zip — At the time of this writing, it has 48 million downloads. It ’ s fully-featured, sup...
·fasterthanli.me·
The case for sans-io
Agents negotiating toward truth machines
Agents negotiating toward truth machines
The latest notions from the developments on human-AI partnerships (yes also DeepSeek), and thoughts triggered by lessons from the global south and blockchain reflections.
·target-is-new.ghost.io·
Agents negotiating toward truth machines
Modeling data and information in an organization
Modeling data and information in an organization
The last weeks I've been focusing a lot on the data and information models in architecture. Organizations have so much data flowing around that it's hard to effectively map it all out. That's a shame because there are some very valuable learnings to be had from that data.
·frederickvanbrabant.com·
Modeling data and information in an organization
The Real Upside of DeepSeek: Cheaper Inference
The Real Upside of DeepSeek: Cheaper Inference
DeepSeek, a company associated with High-Flyer, an $8 billion Chinese hedge fund, changed the AI narrative when it claimed OpenAI-like capabilities for a mere $6 million. The company challenged con…
·om.co·
The Real Upside of DeepSeek: Cheaper Inference
AIs and Robots Should Sound Robotic - Schneier on Security
AIs and Robots Should Sound Robotic - Schneier on Security
Most people know that robots no longer sound like tinny trash cans. They sound like Siri, Alexa, and Gemini. They sound like the voices in labyrinthine customer support phone trees. And even those robot voices are being made obsolete by new AI-generated voices that can mimic every vocal nuance and tic of human speech, down to specific regional accents. And with just a few seconds of audio, AI can now clone someone’s specific voice. This technology will replace humans in many areas. Automated customer support will save money by cutting staffing at ...
·schneier.com·
AIs and Robots Should Sound Robotic - Schneier on Security
30 Lines of Code Could Cut Data Center Power Use by 30%
30 Lines of Code Could Cut Data Center Power Use by 30%
Researchers at the University of Waterloo's Cheriton School of Computer Science in Canada found that modifying just 30 lines of code in the Linux kernel could cut data center energy consumption by 30% to 45%.
·linuxinsider.com·
30 Lines of Code Could Cut Data Center Power Use by 30%
Dumb Pipe
Dumb Pipe
Iroh connections are dumb pipes: easy, direct connections that punch through NATs & stay connected as network conditions change.
·dumbpipe.dev·
Dumb Pipe
Sendme - Iroh
Sendme - Iroh
less net work for networks
·iroh.computer·
Sendme - Iroh
Usage
Usage
Schema for CLIs
·usage.jdx.dev·
Usage
Our own agents with their own tools.
Our own agents with their own tools.
Entering 2025, I decided to spend some time exploring the topic of agents. I started reading Anthropic’s Building effective agents, followed by Chip Huyen’s AI Engineering. I kicked off a major workstream at work on using agents, and I also decided to do a personal experiment of sorts. This is a general commentary on building that project. What I wanted to build was a simple chat interface where I could write prompts, select models, and have the model use tools as appropriate. My side goal was to build this using Cursor and generally avoid writing code directly as much as possible, but I found that generally slower than writing code in emacs while relying on 4o-mini to provide working examples to pull from.
·lethain.com·
Our own agents with their own tools.
I built an internet search engine with MongoDB
I built an internet search engine with MongoDB
When the thought first stuck obviously, I was just like you thinking “what?” why would I ever use MongoDB for an internet search engine in…
·vednig.medium.com·
I built an internet search engine with MongoDB
Everyone knows your location
Everyone knows your location
How I tracked myself down using leaked location data in the in-app ads, and what I found along the way.
·timsh.org·
Everyone knows your location
Defining IPv6 operating modes
Defining IPv6 operating modes
Since IPv6 is gaining momentum, and is generally operating alongside other protocols, it has become important to define the operating modes that may exist in any IPv6 environment. This allows for consistent communication and understanding of a fundamental part of operating a production network. Most of this hard work has been done by the IETF, and 99% of those definitions as can be referenced by engineers and architects when creating designs, proposals, and documentation, can be found in one really well crafted RFC.
·forwardingplane.net·
Defining IPv6 operating modes