System Architecture

System Architecture

7424 bookmarks
Custom sorting
No spooky cookies - Chrome Developers
No spooky cookies - Chrome Developers
Cookies are best fresh, so what are the latest recipes to ensure you can still enjoy spooky season without any stale cookies?
·developer.chrome.com·
No spooky cookies - Chrome Developers
What is a service mesh?
What is a service mesh?
Wondering what is a service mesh? Get all of your service mesh questions answered with this short and sweet primer. We take a look at how the two crucial parts of a service mesh, the control plane and the data plane, work together to handle interservice communication.
·koyeb.com·
What is a service mesh?
Graphic Story: 10BASE-T1L Single Pair Ethernet
Graphic Story: 10BASE-T1L Single Pair Ethernet
This graphic-based story provides an image-driven overview of 10BASE-T1L Single-Pair Ethernet (SPE), which helps facilitate the use of predictive maintenance, Industrial IoT (IIoT), and the gathering
·sparkfun.com·
Graphic Story: 10BASE-T1L Single Pair Ethernet
GPU-accelerated Computing with Nanos Unikernels
GPU-accelerated Computing with Nanos Unikernels
Machine learning frameworks such as TensorFlow and heterogeneous computing libraries such as OpenCL can use GPUs as computing devices in addition or as an alternative to CPU cores. With a new klib implementing a GPU driver, you can run a Nanos unikernel in a VM instance equipped with a GPU and execute your compute-intensive workloads on the GPU.
·nanovms.com·
GPU-accelerated Computing with Nanos Unikernels
The RISC Deprogrammer
The RISC Deprogrammer
I should write up a larger technical document on this, but in the meanwhile is this short (-ish) blogpost. Everything you know about RISC is...
·blog.erratasec.com·
The RISC Deprogrammer
Why Databases Need APIs
Why Databases Need APIs
The latest version of Stargate, an open source project that simplifies how developers work with APIs, has been released.
·thenewstack.io·
Why Databases Need APIs
QR codes | Dan Hollick 🇿🇦
QR codes | Dan Hollick 🇿🇦
Ever wondered how a QR code works? No, me neither but it's low-key fascinating. (Warning, there is some extremely nerdy shit here.👇 )
·typefully.com·
QR codes | Dan Hollick 🇿🇦
Eradicate data – don't destroy unwanted drives – Blocks and Files
Eradicate data – don't destroy unwanted drives – Blocks and Files
Verity ES is a company that permanently deletes data from storage devices so they can be recycled instead of being destroyed, with three-pass overwrite deletion of an 8TB disk drive estimated to take three days. Existing data sanitization and IT asset disposition supplier Revert has set up Verity ES – ES stands for Eradication Software […]
·blocksandfiles.com·
Eradicate data – don't destroy unwanted drives – Blocks and Files
Accessing QEMU storage features without a VM
Accessing QEMU storage features without a VM
The QEMU emulator has a sizable set of storage features, including disk-image file formats like qcow2, snapshots, incremental backup, and storage migration, which are available to virtual machines. This software-defined storage functionality that is available inside QEMU has not been easily accessible outside of it, however. Kevin Wolf and Stefano Garzarella presented at KVM Forum 2022 on the new qemu-storage-daemon program and the libblkio library that make QEMU's storage functionality available even when the goal is not to run a virtual machine (VM).
·lwn.net·
Accessing QEMU storage features without a VM
Gleam
Gleam
The Gleam programming language
·gleam.run·
Gleam
SaaS Data Backup and the API Bottleneck
SaaS Data Backup and the API Bottleneck
Backing up SaaS data is very different from on-premises data protection. Here's what you need to know about making it work.
·devops.com·
SaaS Data Backup and the API Bottleneck
Do ... or Do Not: Why Yoda Never Used Microservices
Do ... or Do Not: Why Yoda Never Used Microservices
A dedicated state management platform for microservices gives us the same kind of abstraction that we see in atomic database transactions.
·thenewstack.io·
Do ... or Do Not: Why Yoda Never Used Microservices
Expanding on UUIDv1 Security Issues
Expanding on UUIDv1 Security Issues
Every week, almost without fail, I come across one thing that confuses, entertains, or most commonly infuriates me. I’ve decided to keep a…
·itnext.io·
Expanding on UUIDv1 Security Issues