WasmEdge
System Architecture
Is Everything Is A File?
A blog by sunfishcode
Measuring System Interface Complexity
A blog by sunfishcode
The large, small, and dynamic viewport units
New CSS units that account for mobile viewports with dynamic toolbars.
Planning User Roles for Your Application
By identifying roles, resources and how they map together, you can implement an efficient system that ensures your users and applications are secure.
4 Ways Quotas Protect Your Organization from Observability Data Explosions
A production-grade, cloud native observability platform such as Chronosphere will handle observability data explosions in a graceful manner.
How We Built Fly Postgres
The database. The app. The legend.
Citi Shows Continuous Secure Ingestion for Software Packages
Handling three million external packages without automation can be horrendous without secure ingestion.
Improving Price Performance Lowers Infrastructure Costs
Aerospike observed 63% better price performance using an AWS Graviton2 cluster when compared with an equivalent x86 cluster. Check the details here.
Application Storage Is Complex. Can Automation Simplify It?
Container Storage Modules, by Dell Technologies, are designed to ease the storage challenges of containerization. #cloudnative #storage #containers #DevOps
Why We Built Cloud Native Object Storage for PostgreSQL with Amazon S3
Timescale built what it saw its users would want to build themselves: A bottomless, consumption-based object store based on Amazon S3 for its cloud native PostgreSQL databases.
SLO vs SLA: What's the Difference and How Does SLI Relate?
SLAs and SLOs are critical to clearly outline your service’s ability and levels and to keep your customers happy.
Lea Kissner on Twitter
“A buddy who's interested in end-to-end encryption (E2EE) but hasn't done one of these projects in the very messy place which is the real world happened to ask me this morning about pitfalls which might not be obvious. So here's a partial list in the hopes that it's helpful. 🧵”
Authorization: A Complete Guide
Everything you need to know about authorization in 2022 - RBAC/ABAC, JWT, authorization in web application frameworks, and critical best practices.
DWARF-based Stack Walking Using eBPF
New programming tool turns sketches, handwriting into code
Cornell University researchers have created an interface that allows users to handwrite and sketch within computer code—a challenge to conventional coding, which typically relies on typing.
Elasticity | System Design Library
Data Sovereignty: The Challenge of the Data Decade | Dell
Learn how effective data management will enable companies to turn data into insights and navigate the issues around data sovereignty requirements.
Autonomy, packet size, friction, fanout, and velocity
Nostalgia is a dangerous drug and it’s always risky to wallow in it. So those of us who fondly remember the early blogosphere, and now want to draw parallels to the fediverse, should do so ca…
Santa Clara Principles on Transparency and Accountability in Content Moderation
Scaling Mastodon: The Compendium | Hazel Weakly
This is honestly a very hastily written selection of various snippets, with text extracted, and notes. No real editing thought was put into this, so I hope it’s...
santa-clara-OG.png (PNG Image, 1200 × 600 pixels)
A Programmer-Friendly I/O Abstraction Over io_uring and kqueue | TigerBeetle
To infinity and beyond: enabling the future of GitHub's REST API with API versioning | The GitHub Blog
We’re introducing calendar-based versioning for our REST API, so we can keep evolving our API, whilst still giving integrators a smooth migration path and plenty of time to update their integrations.
The Missing Part of GitHub Actions Workflows: Monitoring
To easily and securely understand and troubleshoot GitHub Actions workflow activity, developers should have a handy monitoring tool in place, such as Thundra's Foresight.
When to use gRPC vs GraphQL
We dig into two of the most popular API protocols to see where they work best.
Yet another try at the BPF program allocator
The BPF subsystem, which allows code to be loaded into the kernel from user
space and safely executed in the kernel context, is bound to create a number of
challenges for the kernel as a whole. One might not think that allocating
memory for BPF programs would be high on the list of problems, but life
(and memory management) can be surprising. The attempts to do a better job
of providing space for compiled BPF code have, to date, only been partially
successful; now Song Liu is back with a new
approach to finish the job.
What Is Data Streaming?
Confluent's recent Current conference showed that many people want to see streaming become the default way to process data. They are working hard to get the industry there, but it won’t happen right away.
How to Win at Zero Trust | Akeyless
How to Win at Zero Trust: A session presented by former Forrester analyst, Dr. Zero Trust, Dr. Chase Cunningham.
Files · master · Christine Lemmer-Webber / pubstrate · GitLab
ActivityPub and ActivityStreams implementation in GNU Guile.