System Architecture

System Architecture

7371 bookmarks
Custom sorting
Planning User Roles for Your Application
Planning User Roles for Your Application
By identifying roles, resources and how they map together, you can implement an efficient system that ensures your users and applications are secure.
·thenewstack.io·
Planning User Roles for Your Application
Improving Price Performance Lowers Infrastructure Costs
Improving Price Performance Lowers Infrastructure Costs
Aerospike observed 63% better price performance using an AWS Graviton2 cluster when compared with an equivalent x86 cluster. Check the details here.
·thenewstack.io·
Improving Price Performance Lowers Infrastructure Costs
Application Storage Is Complex. Can Automation Simplify It?
Application Storage Is Complex. Can Automation Simplify It?
Container Storage Modules, by Dell Technologies, are designed to ease the storage challenges of containerization. #cloudnative #storage #containers #DevOps
·thenewstack.io·
Application Storage Is Complex. Can Automation Simplify It?
Lea Kissner on Twitter
Lea Kissner on Twitter
“A buddy who's interested in end-to-end encryption (E2EE) but hasn't done one of these projects in the very messy place which is the real world happened to ask me this morning about pitfalls which might not be obvious. So here's a partial list in the hopes that it's helpful. 🧵”
·twitter.com·
Lea Kissner on Twitter
Authorization: A Complete Guide
Authorization: A Complete Guide
Everything you need to know about authorization in 2022 - RBAC/ABAC, JWT, authorization in web application frameworks, and critical best practices.
·frontegg.com·
Authorization: A Complete Guide
New programming tool turns sketches, handwriting into code
New programming tool turns sketches, handwriting into code
Cornell University researchers have created an interface that allows users to handwrite and sketch within computer code—a challenge to conventional coding, which typically relies on typing.
·techxplore.com·
New programming tool turns sketches, handwriting into code
Autonomy, packet size, friction, fanout, and velocity
Autonomy, packet size, friction, fanout, and velocity
Nostalgia is a dangerous drug and it’s always risky to wallow in it. So those of us who fondly remember the early blogosphere, and now want to draw parallels to the fediverse, should do so ca…
·blog.jonudell.net·
Autonomy, packet size, friction, fanout, and velocity
Scaling Mastodon: The Compendium | Hazel Weakly
Scaling Mastodon: The Compendium | Hazel Weakly
This is honestly a very hastily written selection of various snippets, with text extracted, and notes. No real editing thought was put into this, so I hope it’s...
·hazelweakly.me·
Scaling Mastodon: The Compendium | Hazel Weakly
The Missing Part of GitHub Actions Workflows: Monitoring
The Missing Part of GitHub Actions Workflows: Monitoring
To easily and securely understand and troubleshoot GitHub Actions workflow activity, developers should have a handy monitoring tool in place, such as Thundra's Foresight.
·thenewstack.io·
The Missing Part of GitHub Actions Workflows: Monitoring
When to use gRPC vs GraphQL
When to use gRPC vs GraphQL
We dig into two of the most popular API protocols to see where they work best.
·stackoverflow.blog·
When to use gRPC vs GraphQL
Yet another try at the BPF program allocator
Yet another try at the BPF program allocator
The BPF subsystem, which allows code to be loaded into the kernel from user space and safely executed in the kernel context, is bound to create a number of challenges for the kernel as a whole. One might not think that allocating memory for BPF programs would be high on the list of problems, but life (and memory management) can be surprising. The attempts to do a better job of providing space for compiled BPF code have, to date, only been partially successful; now Song Liu is back with a new approach to finish the job.
·lwn.net·
Yet another try at the BPF program allocator
What Is Data Streaming?
What Is Data Streaming?
Confluent's recent Current conference showed that many people want to see streaming become the default way to process data. They are working hard to get the industry there, but it won’t happen right away.
·thenewstack.io·
What Is Data Streaming?
How to Win at Zero Trust | Akeyless
How to Win at Zero Trust | Akeyless
How to Win at Zero Trust: A session presented by former Forrester analyst, Dr. Zero Trust, Dr. Chase Cunningham.
·akeyless.io·
How to Win at Zero Trust | Akeyless