Baida | A mathematical theory of privacy

System Architecture
Linear – A better way to build products
Linear streamlines issues, sprints, and product roadmaps. It’s the new standard for modern software development.
Boyer–Moore string-search algorithm - Wikipedia
From Gathering To Filtering
From Gathering To Filtering Software Development, API development, Indutrial IOT
Google CALM: Confident Adaptive Language Modeling, Generates 3X Faster TEXT with LLM
Google's new technology, Confident Adaptive Language Modeling (CALM), speeds up large language models (LLM) upto 3 times.
WorldBrain's Memex
Data 2023: Revenge of the SQL Nerds
For data management, Data Mesh will continue to soak up plenty of oxygen. But behind the headlines, watch for critical mass ecosystems to form around Data Lakehouses.
Intel Expands Scope of oneAPI Initiative
Intel has expanded its effort to drive adoption of its oneAPI initiative to include support for its latest generation of processors.
4 Ways to Use Kernel Security Features for Process Monitoring
An effective runtime security strategy takes each layer into consideration and monitors the process within each container.
Per-extent encrypted keys for fscrypt
The kernel's fscrypt
subsystem enables filesystems to store files and
directories in encrypted form, protecting them against offline attacks. A
few filesystems support encryption with fscrypt currently, but Btrfs is an
exception, despite a number of attempts to add this feature. The problem
is that, as so often seems to be the case, Btrfs works differently and does
not fit well with one of the key assumptions in the design of fscrypt. With this
patch series, Sweet Tea Dorminy is working to enhance fscrypt to be a
better fit for filesystems like Btrfs.
How to Get Started with HTTP/3
HTTP/3 is is still in its early days with a lot of room to mature, but if you need uninterrupted user experiences on the move, you can start adopting it now.
Microservices with Benefits - The Blinking Caret
How you can use microservices with event-sourcing and CQRS to achieve the true benefits attributed to microservices
Time, Markets, and APIs
I frustratingly see APIs everywhere in a world where most do not even know what an API is while also simultaneously using them thousands of times each day. I see and hear the gears of this new digital world turning each day, and can’t help but share stories about what is happening around us while leveraging the stories of others to help me make sense of this moment. I was recently reading About Time - A History of Civilization in Twelve Clocks by David Rooney, and learned about the clock that was installed at the Beurs van Hendrick de Keyser, the first stock exchange in 1607. Ever since reading this book I have been thinking about the role that time plays in our endless technological march forward, how the Internet and APIs have shifted our sense of space and time, and ushered us into a new period of markets where we are the commodities and our lives are the next generation of financial products.
Decentraleyes | Local CDN Emulation
A web browser extension that emulates Content Delivery Networks to protect your privacy.
DevOps Self-Service Pipeline Architecture and Its 3–2–1 Rule
A high-level architectural overview of the self-service pipeline
A quick (and probably boring) introduction to the Cognitive Web - Cognitive Web
In a few thousand years of humans developing their civilizations, there always has been a big question and that is how human mind actually works? This is not a new question and we can agree on that as a matter of fact. Ancient Greek philosophers had this question. To be honest, this question is somehow
The Interesting Years Ahead For Servers
By every measure we can get our hands on, 2022 was a bumper year for server shipments and server spending, which is good indicator for the appetite for
Buying vs Building Systems
Before Christmas a good friend of mind, Rachel, asked me if I could help her set up a website for a business, she was starting to sell
WAL Mode in LiteFS
LiteFS v0.3.0 now supports SQLite's write-ahead log journal mode.
Connected But Not Secured: The Dangers of IoT
As the number of connected devices continues to grow, the dangers of IoT grows with it. Many IoT devices are designed with convenience in mind, rather than security
Let’s build a futuristic computer
Inventory of existing hardware, software and design technologies
Crossplane: What Most People Get Wrong (and How to Get It Right)
Crossplane contains the logic, machinery and reusable components that can be assembled to reliably deliver infrastructure and applications to production.
Supermicro Throws Its Weight Behind Arm Servers
Supermicro has become the latest of the big OEMs to add Arm-based systems to its portfolio, with the launch of its Mt. Hamilton platform based on the
Taking Data Curation to a New Level
The importance of data-driven decision-making can't be understated. As companies continue to grow, data curators have the task of finding a needle in a haystack.
PromCon 2022: Why Prometheus Had to Change
As Prometheus’ celebrates its 10-year anniversary, its users are also becoming smarter about what they want and need.
Manage Security Risk in Your Supply Chain
Managing risk in supply chain security starts with risk documentation, risk monitoring and frequent governance.
How to Build an API-Centric Digital Architecture
This is the first of a two-part series. Just like with species, the ability to quickly evolve is a key
Engineering Best Practices of CI Pipelines
A look at strategies implemented by software giants, so you can benefit from their experience and apply their strategies in our own CI/CD pipelines.
Better Onboarding with Verifiable Credentials
Making onboarding easier would result in better customer experience, more customers, and reduced support costs.
Easy, alternative soft deletion: `deleted_record_insert`
An alternate to traditional codedeleted_at/code soft deletion that stays out of the way and minimizes bugs.