System Architecture

System Architecture

7641 bookmarks
Custom sorting
Still waiting for stackable security modules
Still waiting for stackable security modules
The Linux security module (LSM) mechanism was created as a result of the first Kernel Summit in 2001; it was designed to allow the development of multiple approaches to Linux security. That goal has been met; there are several security modules available with current kernels. The LSM subsystem was not designed, though, to allow multiple security modules to work together on the same system. Developers have been working to rectify that problem almost since the LSM subsystem was merged, but with limited success; some small security modules can be stacked on top of the "major" ones, but arbitrary stacking is not possible. Now, a full 20 years after security-module support went into the 2.5 development kernel series, it looks like a solution to the stacking problem may finally be getting closer.
·lwn.net·
Still waiting for stackable security modules
The Next Evolution of Virtualization Infrastructure
The Next Evolution of Virtualization Infrastructure
Developers can use features like monitoring, pipelines, GitOps, serverless, service mesh and more, whether the target workload is a container or a VM.
·thenewstack.io·
The Next Evolution of Virtualization Infrastructure
Hub and Spoke: A Better Way to Architect Your Tech Stack
Hub and Spoke: A Better Way to Architect Your Tech Stack
The hub-and-spoke approach to architecting the technology stack combines the stability of a monolithic platform with the agility of microservices so that you can benefit from new capabilities and software innovation.
·thenewstack.io·
Hub and Spoke: A Better Way to Architect Your Tech Stack
Moving past TCP in the data center, part 1
Moving past TCP in the data center, part 1
At the recently concluded Netdev 0x16 conference, which was held both in Lisbon, Portugal and virtually, Stanford professor John Ousterhout gave his personal views on where networking in data centers needs to be headed. To solve the problems that he sees, he suggested some "fairly significant changes" to those environments, including leaving behind the venerable—ubiquitous—TCP transport protocol. While LWN was unable to attend the conference itself, due to scheduling and time-zone conflicts, we were able to view the video of Ousterhout's keynote talk to bring you this report.
·lwn.net·
Moving past TCP in the data center, part 1
Avassa - Edge Cloud Management
Avassa - Edge Cloud Management
Enabling organizations to manage distributed applications on the distributed edge
·avassa.io·
Avassa - Edge Cloud Management
Building New Value in IT Systems Management
Building New Value in IT Systems Management
IT systems need to be capable of displaying all enterprise architecture data in a strategic way that can be easily understood and acted on.
·devops.com·
Building New Value in IT Systems Management
Data good practices: If it ain’t computable, it’s a string….
Data good practices: If it ain’t computable, it’s a string….
Choosing the right data type for a dataset variable, database fields, data model element, or API property can make a huge difference in terms of usability and quality. A mistake that I have commonly seen made over the many years of working with data is the use of numeric variables for things that are not computable. The most typical case is with categorical variables codes, but other examples includes identifiers, accounts numbers, postal codes, and the likes. If something looks like a number, we have a human tendency to assume it should be stored as a number. This is often not necessary and unfortunately can have significant side effects or loss of information.
·apievangelist.com·
Data good practices: If it ain’t computable, it’s a string….
One-Time Programs
One-Time Programs
One of the things I like to do on this blog is write about new research that has a practical angle. Most of the time (I swear) this involves writing about other folks’ research: it’s no…
·blog.cryptographyengineering.com·
One-Time Programs
Permify | Open-source authorization service and policy engine
Permify | Open-source authorization service and policy engine
Permify is an open-source authorization for building RBAC, ABAC, and Access Control in your application. Create your access control model, sync your authorization data, and enforce permission with a single check!
·permify.co·
Permify | Open-source authorization service and policy engine
Structured error messages for HTTP APIs
Structured error messages for HTTP APIs
Ever since I started to work on the Apache APISIX project, I’ve been trying to improve my knowledge and understanding of REST RESTful HTTP APIs. For this, I’m reading and watching the following sources: Books. At the moment, I’m finishing API Design Patterns. Expect a review soon.YouTube. I’d recommend ErikWilde' channel. While some videos are better than others, they all focus on APIs.IETF RFCs. Most RFCs are not about APIs, but a friendly person compiled a list of the o
·blog.frankel.ch·
Structured error messages for HTTP APIs
FeedLand
FeedLand
It's an application that runs in your web browser for managing lists of feeds, sharing them with other users (both in and outside of FeedLand), and reading and sharing news.
·feedland.org·
FeedLand
Flow-based programming | Learning Elixir
Flow-based programming | Learning Elixir
Let's move on to discuss another topic that isn't necessarily new, but is recently making a stir in the programming world.
·subscription.packtpub.com·
Flow-based programming | Learning Elixir
Redis Explained
Redis Explained
A deep technical dive into all things Redis. Covering various Redis topologies, data persistence and process forking.
·architecturenotes.co·
Redis Explained
Copyright notices (or the lack thereof) in kernel code
Copyright notices (or the lack thereof) in kernel code
The practice of requiring copyright assignments for contributions to free-software projects has been in decline for years; the GNU Binutils project may be the latest domino to fall in that regard. The Linux kernel project, unlike some others, has always allowed contributors to retain their copyrights, resulting in a code base that has widely distributed ownership. In such a project, who owns the copyright to a given piece of code is not always obvious. Some developers (or their employers) are insistent about the placement of copyright notices in the code to document their ownership of parts of the kernel. A series of recent discussions within the Btrfs subsystem, though, has made it clear that there is no project-wide policy on when these notices are warranted — or even acceptable.
·lwn.net·
Copyright notices (or the lack thereof) in kernel code
A Pattern Language by Christopher Alexander, Murray Silverstein, and Sara Ishikawa – The Rabbit Hole
A Pattern Language by Christopher Alexander, Murray Silverstein, and Sara Ishikawa – The Rabbit Hole
Summary A Pattern Language is the second in a series of books which describe an entirely new attitude to architecture and planning. The books are intended to provide a complete working alternative to our present ideas about architecture, building, and planning – an alternative which will, we hope, gradually replace current ideas and practices Key […]
·blas.com·
A Pattern Language by Christopher Alexander, Murray Silverstein, and Sara Ishikawa – The Rabbit Hole