System Architecture

System Architecture

7429 bookmarks
Custom sorting
Cross Region Unikernels at the Edge
Cross Region Unikernels at the Edge
It seems that all the cool companies are doing cross-region geo-routing for applications today. Many of them will label this as edge. For someone like myself edge usually means something different like having actual devices at sea, in the air, on a cell tower, in a Tesla, etc but if you are coming from the CDN world that translates to having multiple POPs (point of presence) spread throughout the world where you can host typically static sites (like javascript, css, etc.) closer to the end-user.
·nanovms.com·
Cross Region Unikernels at the Edge
Aestheticodes Visual Recognition App
Aestheticodes Visual Recognition App
Aestheticodes visual recognition app was developed by Nottingham University A context or brand specific APP ensures users are able to find and trigger our beautifully
·aestheticodes.com·
Aestheticodes Visual Recognition App
Part 1. Authentication with Social Linking
Part 1. Authentication with Social Linking
Anyone building consumer facing apps, be it mobile or web, has spent time looking at different options for authentication and not just the…
·itnext.io·
Part 1. Authentication with Social Linking
Fools! Stop Mysticizing System Dynamics
Fools! Stop Mysticizing System Dynamics
A system dynamics model, properly considered, is just an analogy dressed up in a bit of formalism.
·twitchard.github.io·
Fools! Stop Mysticizing System Dynamics
Using GPT-3 to pathfind in random graphs
Using GPT-3 to pathfind in random graphs
I wondered how GPT-3 might do on the following problem: given a partially-connected graph, find a path between two nodes, or determine that no path exists. I wrote some code to automate generating …
·jacobbrazeal.wordpress.com·
Using GPT-3 to pathfind in random graphs
BEM — Block Element Modifier
BEM — Block Element Modifier
BEM — Block Element Modifier is a methodology, that helps you to achieve reusable components and code sharing in the front-end.
·getbem.com·
BEM — Block Element Modifier
How we found sanity in a subset of Tailwind CSS - Frameable
How we found sanity in a subset of Tailwind CSS - Frameable
Since its inception, the idea of utility CSS has been met with both praise by some and disdain by others. Tailwind took utility CSS to the extreme, and so has been especially controversial. Those who love it will say... - "It is a relief not having to come up with unique cla…
·frameable.com·
How we found sanity in a subset of Tailwind CSS - Frameable
White glove service
White glove service
It’s not about the gloves. The pointlessness of the white gloves is actually a big part of it. Good service meets expectations. It is the fulfillment of a promise to the customer. White glove…
·seths.blog·
White glove service
Why electronic voting is a DESTRUCTIVE idea - Software Craftsmanship Weekly 105 - Vived
Why electronic voting is a DESTRUCTIVE idea - Software Craftsmanship Weekly 105 - Vived
Just as last week, one big topic stood out - The Merge - this time, we'll go through some exciting announcements in the tech world concerning Linux, databases, and ML models. But before all that, a few current world events will unfortunately permeate our Weekly.
·vived.io·
Why electronic voting is a DESTRUCTIVE idea - Software Craftsmanship Weekly 105 - Vived
Name is the Leftmost Part of Semver
Name is the Leftmost Part of Semver
Sorry, this is a bit of a rant. My preferred routing library for React has been Raviger for a while but recently I needed to figure out how…
·kristiandupont.medium.com·
Name is the Leftmost Part of Semver
How to Create a Software Bill of Materials
How to Create a Software Bill of Materials
SBOMs display a complete inventory of the application, including all open source components and vulnerabilities. Here's how to make one, using syft and grype.
·thenewstack.io·
How to Create a Software Bill of Materials
DevOps Is Dead. Embrace Platform Engineering
DevOps Is Dead. Embrace Platform Engineering
Platforms provide golden paths, with recommended tools and best security practices built in, reducing cognitive load while preserving developer freedom.
·thenewstack.io·
DevOps Is Dead. Embrace Platform Engineering
Building Software Bridges To Ensure Workload Portability
Building Software Bridges To Ensure Workload Portability
In these modern IT days – where the rapidly-evolving environment stretches from the datacenter to the cloud and edge, with a range of hyperscale cloud
·nextplatform.com·
Building Software Bridges To Ensure Workload Portability
BPF as a safer kernel programming environment
BPF as a safer kernel programming environment
For better or worse, C is the lingua franca in the world of kernel engineering. The core logic of the Linux kernel is written entirely in C (with a bit of assembly), as are its drivers and modules. While C is rightfully celebrated for its powerful yet simple semantics, it is an older language that lacks many of the features present in modern languages such as Rust. The BPF subsystem, on the other hand, provides a programming environment that allows engineers to write programs that can run safely in kernel space. At the 2022 Linux Plumbers Conference in Dublin, Ireland, Alexei Starovoitov presented an overview of how BPF has evolved over the years to provide a new model for kernel programming.
·lwn.net·
BPF as a safer kernel programming environment
Adam Savage on Refurbished vs. New Tools and Tool Replacement Sadness
Adam Savage on Refurbished vs. New Tools and Tool Replacement Sadness
In this installment of “Ask Adam,” Adam Savage answers two very important questions: When should you bother to refurb a tool vs. buying a new one and does he get sad when he has to repl…
·blog.adafruit.com·
Adam Savage on Refurbished vs. New Tools and Tool Replacement Sadness
The Algorithms
The Algorithms
Open Source resource for learning Data Structures & Algorithms and their implementation in any Programming Language
·the-algorithms.com·
The Algorithms
Merkle Trees in Elixir
Merkle Trees in Elixir
A hash tree or Merkle tree is a tree in which every non-leaf node is labelled with the hash of the labels or values (in case of leaves) of its child nodes. Hash trees are useful because they allow efficient and secure verification of the contents of large data structures. Hash trees are used in the IPFS file system, BitTorrent protocol, Git, Bitcoin, Ethereum, and a number of NoSQL systems like Apache Cassandra and Riak. They are used for many kinds of verification, especially of large chunks of data.
·yos.io·
Merkle Trees in Elixir
Wall vs CPU time, or the cost of asyncio Tasks
Wall vs CPU time, or the cost of asyncio Tasks
Performing I/O concurrently is one of asyncio's superpowers (if not its main superpower). This is accomplished, directly or indirectly (through helpers like asyncio.gather), by the creation and use of asyncio tasks. Even if you've never created an asyncio task yourself or called gather, you've used them because every
·threeofwands.com·
Wall vs CPU time, or the cost of asyncio Tasks
The Zeek Network Security Monitor
The Zeek Network Security Monitor
Zeek (formerly Bro) is the world’s leading platform for network security monitoring. Flexible, open source, and powered by defenders.
·zeek.org·
The Zeek Network Security Monitor
Bro IDS
Bro IDS
What is Bro IDS (Zeek)? Thinking about Bro as an IDS alone doesn’t accurately describe the breadth of its capabilities. Let's break down a more effective description.
·bricata.com·
Bro IDS
ksqlDB - Event Streaming Database Built for Stream Processing
ksqlDB - Event Streaming Database Built for Stream Processing
Build applications that respond immediately to real-time events, seamlessly using existing Kafka infrastructure to deploy stream processing with just a few SQL statements.
·confluent.io·
ksqlDB - Event Streaming Database Built for Stream Processing