System Architecture

System Architecture

7423 bookmarks
Custom sorting
API Dimensions That Ground the Conversation
API Dimensions That Ground the Conversation
I am perpetually working on what I consider to be the essential API dimensions that ground how we talk about APIs. While having a common definition of the API lifecycle, as well as a clear list of roles and stakeholders involved across the API lifecycle is essential–these dimensions or focused on how we “see” and invest specifically in our APIs. In my experience, there are many ways we talk past each other and introduce friction into our discussions about how to do APIs well. While there are other dimensions not reflected here, these reflect on the areas I find myself talking with enterprises about the most, and that I am getting more opinionated on to help ground my conversations.
·apievangelist.com·
API Dimensions That Ground the Conversation
Build the modular monolith first
Build the modular monolith first
Even talking about building a monolith today, is a bit taboo. It is all about microservices at the moment, and has been for a few years. But they aren’t a silver bullet…
·fearofoblivion.com·
Build the modular monolith first
10 Ways to Manage API Security Risks
10 Ways to Manage API Security Risks
Whether an API was built from scratch or integrated from a third-party source, securing it requires organized and active end-to-end visibility.
·thenewstack.io·
10 Ways to Manage API Security Risks
The Distributed Computing Manifesto
The Distributed Computing Manifesto
Today, I am publishing the Distributed Computing Manifesto, a canonical document from the early days of Amazon that transformed the architecture of Amazon's ecommerce platform. It highlights the challenges we were facing at the end of the 20th century, and hints at where we were headed.
·allthingsdistributed.com·
The Distributed Computing Manifesto
Why Cloud Data Egress Is Expensive
Why Cloud Data Egress Is Expensive
Taking time to understand the tradeoffs could mean big savings for the organization and fewer surprises for teams that manage cloud infrastructure.
·thenewstack.io·
Why Cloud Data Egress Is Expensive
Sapling SCM | Sapling
Sapling SCM | Sapling
Sapling is a source control system developed and used at Meta that places special emphasis on usability and scalability. Git and Mercurial users will find many of the basic concepts familiar, and that workflows like understanding your repository, working with stacks of commits, and recovering from mistakes, are substantially easier.
·sapling-scm.com·
Sapling SCM | Sapling
OpenTelemetry Properly Explained and Demoed
OpenTelemetry Properly Explained and Demoed
Lightstep's Austin Parker and Splunk's Morgan McClean share how the CNCF OpenTelemetry project created demo services to help the cloud native community better understand cloud native development practices and more.
·thenewstack.io·
OpenTelemetry Properly Explained and Demoed
The journey of your work has never been clearer | The GitHub Blog
The journey of your work has never been clearer | The GitHub Blog
In July, we launched the general availability of GitHub Projects, and now we are excited to bring you even more features designed to make it easier to plan and track in the same place you build!
·github.blog·
The journey of your work has never been clearer | The GitHub Blog
Code Sharing in Microservices Architecture
Code Sharing in Microservices Architecture
This is a story of leveraging various tools to empower microservices architecture, how we use it at PerimeterX and when to use and not use
·medium.com·
Code Sharing in Microservices Architecture
Home - Profian
Home - Profian
What is Confidential Computing? Confidential Computing encrypts sensitive data while in use in a public cloud. It is today’s gold standard for cloud security and a foundational “must-have” to continue the digital transformation journey with workloads that would...
·profian.com·
Home - Profian
Enarx | Enarx
Enarx | Enarx
Enarx: Confidential Computing with WebAssembly
·enarx.dev·
Enarx | Enarx
What is Confidential Computing? - Profian
What is Confidential Computing? - Profian
Confidential Computing is a leading-edge security technology that encrypts sensitive data in use in a public cloud, private cloud or on-premises. It completes the data security triangle since data at rest (in storage) and in transit (across networks)...
·profian.com·
What is Confidential Computing? - Profian
Limiting the Deployment Blast Radius
Limiting the Deployment Blast Radius
Here’s a synopsis of what could go wrong in complex application environments and how you can contain your risk using tools and best practices.
·thenewstack.io·
Limiting the Deployment Blast Radius
Helping VFX studios pave a path to the cloud
Helping VFX studios pave a path to the cloud
By: Peter Cioni (Netflix), Alex Schworer (Netflix), Mac Moore (Conductor Tech.), Rachel Kelley (AWS), Ranjit Raju (AWS)
·netflixtechblog.com·
Helping VFX studios pave a path to the cloud
How to Create Accessible Links
How to Create Accessible Links
Diving deeper into improving the accessibility of HTML anchors
·javascript.plainenglish.io·
How to Create Accessible Links
OpenTelemetry, The Missing Ingredient
OpenTelemetry, The Missing Ingredient
How OpenTelemetry bridges the gap between our code and the observability backend options
·codeproject.com·
OpenTelemetry, The Missing Ingredient
Sharding & IDs at Instagram
Sharding & IDs at Instagram
With more than 25 photos and 90 likes every second, we store a lot of data here at Instagram. To make sure all of our important data fits…
·instagram-engineering.com·
Sharding & IDs at Instagram
ActivityPub hot take
ActivityPub hot take
Most use cases of ActivityPub would be better off as Atom or RSS feeds.
·beesbuzz.biz·
ActivityPub hot take