System Architecture

System Architecture

7672 bookmarks
Custom sorting
Semantic Search with Phoenix, Axon, and Elastic
Semantic Search with Phoenix, Axon, and Elastic
Learn how to to create a semantic search tool for matching wines to users from natural language queries in pure Elixir
·dockyard.com·
Semantic Search with Phoenix, Axon, and Elastic
Common Use Cases for Graph Databases
Common Use Cases for Graph Databases
People use graph databases every day and seldom know it. Facebook, Instagram, LinkedIn and Twitter all rely on graph databases and analytics to understand how users relate to each other and to connect users with the right content.
·thenewstack.io·
Common Use Cases for Graph Databases
A Standard Pricing Model for Open Core
A Standard Pricing Model for Open Core
Buyer-based open core is the most effective framework for monetizing open source without selling out.
·thenewstack.io·
A Standard Pricing Model for Open Core
GitOps
GitOps
GitOps is Continuous Deployment for cloud native applications
·gitops.tech·
GitOps
Getting Started with Kubernetes Autoscaling
Getting Started with Kubernetes Autoscaling
A look at how Kubernetes autoscaling works, the different autoscaling methods Kubernetes provides and potential errors that can arise.
·thenewstack.io·
Getting Started with Kubernetes Autoscaling
Why Web3 Needs a Real-Time Data Layer Now More Than Ever
Why Web3 Needs a Real-Time Data Layer Now More Than Ever
Today’s blockchain implementations are too costly and slow to function as generalized Web3 computing platforms. Successful systems are using real-time, off-chain data to find market fit.
·thenewstack.io·
Why Web3 Needs a Real-Time Data Layer Now More Than Ever
4 Ways To Achieve Comprehensive Security
4 Ways To Achieve Comprehensive Security
Zero trust protects identities, endpoints, applications, networks, infrastructure, and data, and can be implemented in different ways.
·darkreading.com·
4 Ways To Achieve Comprehensive Security
Protocols As Practice Projects
Protocols As Practice Projects
It's difficult find programming projects that you're motivated to work on that expand your skillset. Implementing protocols is one of the best options.
·naiveai.hashnode.dev·
Protocols As Practice Projects
Zero Trust
Zero Trust
A framework of identity, authentication, policy management and access control processes that are continuously constituted, protected, and free from vulnerabilities when implemented and deployed for enterprises. Find out how.
·mef.net·
Zero Trust
7 Edge Computing Uses You Should Know
7 Edge Computing Uses You Should Know
Discover seven different examples of edge computing and how each one lands in the edge computing landscape.
·thenewstack.io·
7 Edge Computing Uses You Should Know
Compute Is Easy, Memory Is Harder And Harder
Compute Is Easy, Memory Is Harder And Harder
What good is a floating point operation embodied in a vector or matrix unit if you can’t get data into fast enough to actually use the compute engine to
·nextplatform.com·
Compute Is Easy, Memory Is Harder And Harder
Six Signs You’ve Got an API Sprawl Problem
Six Signs You’ve Got an API Sprawl Problem
API management can increase development velocity by removing technical debt and avoiding the need for bolted-on security late in the development process.
·thenewstack.io·
Six Signs You’ve Got an API Sprawl Problem
Taming Names in Software Development
Taming Names in Software Development
Good names What is a name? A name is a label, a handle, a pointer in your brain’s memory. A complex idea neatly encapsulated. A name lets you refer to “the economy” , or “dogfooding” mid-sentence without needing a three-paragraph essay to explain the term. If you think of software development as just carving up […]
·simplethread.com·
Taming Names in Software Development
Meet Nosey Parker - An Artificial Intelligence Based Scanner That Sniffs Out Secrets - Praetorian
Meet Nosey Parker - An Artificial Intelligence Based Scanner That Sniffs Out Secrets - Praetorian
Introduction Because inadvertent secrets disclosure is one of the more common attack paths into an organization, we’ve developed Nosey Parker—a machine learning powered, multi-phase solution for locating secret exposures. Nosey Parker has a significantly higher signal-to-noise ratio than many popular alternatives. With ML denoising, false positives are all but eliminated and our standalone ML-powered scanner […]
·praetorian.com·
Meet Nosey Parker - An Artificial Intelligence Based Scanner That Sniffs Out Secrets - Praetorian