System Architecture

System Architecture

7447 bookmarks
Custom sorting
Event Driven Architecture — 5 Pitfalls to Avoid
Event Driven Architecture — 5 Pitfalls to Avoid
5 pitfalls that Wix engineers have encountered with event driven architecture. Battle-tested proven solutions are provided for each…
·natansil.medium.com·
Event Driven Architecture — 5 Pitfalls to Avoid
Best Practices for Maintainers
Best Practices for Maintainers
Making your life easier as an open source maintainer, from documenting processes to leveraging your community.
·opensource.guide·
Best Practices for Maintainers
Spotify’s Event Delivery – The Road to the Cloud (Part I) - Spotify Engineering
Spotify’s Event Delivery – The Road to the Cloud (Part I) - Spotify Engineering
Whenever a user performs an action in the Spotify client—such as listening to a song or searching for an artist—a small piece of information, an event, is sent to our servers. Event delivery, the process of making sure that all events gets transported safely from clients all over the world to our central processing system, [...]
·engineering.atspotify.com·
Spotify’s Event Delivery – The Road to the Cloud (Part I) - Spotify Engineering
Kubernetes StatefulSets are Broken
Kubernetes StatefulSets are Broken
Kubernetes was originally intended to act as a container orchestration platform for stateless workloads, not stateful apps.
·plural.sh·
Kubernetes StatefulSets are Broken
Asdf Performance - Stratus3D
Asdf Performance - Stratus3D
I’ve been a maintainer of asdf for about 6 years now. Most of my work these last several years has been fixing bugs, writing automated tests …
·stratus3d.com·
Asdf Performance - Stratus3D
AWS unveils private 5G network
AWS unveils private 5G network
Well, more like 4G LTE right now, and you'll probably need someone to put up the radio
·theregister.com·
AWS unveils private 5G network
Analyzing the Security of eBPF Maps | CrowdStrike
Analyzing the Security of eBPF Maps | CrowdStrike
Take a deep dive into the security implications for eBPF users by exploring how eBPF is used in Linux and Cloud environments, and how it can be abused by attackers.
·crowdstrike.com·
Analyzing the Security of eBPF Maps | CrowdStrike
Data Mesh: What is it and What Does it Mean for Data Engineers?
Data Mesh: What is it and What Does it Mean for Data Engineers?
Data Mesh draws its concepts from software engineering best practices such as micro and agile development. Applying those concepts to data operations is rewarding if successfully implemented.
·lakefs.io·
Data Mesh: What is it and What Does it Mean for Data Engineers?
Stupid SMP Tricks: A Review of Locking Engineering Principles and Hierarchy
Stupid SMP Tricks: A Review of Locking Engineering Principles and Hierarchy
Daniel Vetter put together a pair of intriguing blog posts entitled Locking Engineering Principles and Locking Engineering Hierarchy . These appear to be an attempt to establish a set of GPU-wide or perhaps even driver-tree-wide concurrency coding conventions. Which would normally be none of my…
·paulmck.livejournal.com·
Stupid SMP Tricks: A Review of Locking Engineering Principles and Hierarchy
Veloit AI - Supercharge your app
Veloit AI - Supercharge your app
Machine learning for no code developers, Integrate Machine Learning in your application in seconds without code
·beta.veloitai.tech·
Veloit AI - Supercharge your app
Zero Trust Network Security with Identity-Aware Proxies
Zero Trust Network Security with Identity-Aware Proxies
Implementing Zero Trust is not an easy task for enterprise IT. Some of the challenges include the sprawl of user identities, the proliferation of internal applications, reliance on third-party SaaS applications, and the rise of hybrid, multi-cloud, and edge architectures.
·thenewstack.io·
Zero Trust Network Security with Identity-Aware Proxies
Teleport - Access Computing Resources Anywhere
Teleport - Access Computing Resources Anywhere
Teleport allows engineers and security professionals to unify access for SSH servers, Kubernetes clusters, web applications, and databases across all environments.
·goteleport.com·
Teleport - Access Computing Resources Anywhere
eBPF or Not, Sidecars are the Future of the Service Mesh
eBPF or Not, Sidecars are the Future of the Service Mesh
eBPF and sidecars are not an either-or choice, and the assertion that eBPF needs to replace sidecars is a marketing construct, not an actual requirement.
·thenewstack.io·
eBPF or Not, Sidecars are the Future of the Service Mesh
What Is 5G, and Does It Actually Make a Difference?
What Is 5G, and Does It Actually Make a Difference?
5G may seem like a confusing mess of buzzwords, but it’s not all marketing hype. We explain the situations where it can provide tangible benefits.
·nytimes.com·
What Is 5G, and Does It Actually Make a Difference?
It Might Be Our Data, But It’s Not Our Breach
It Might Be Our Data, But It’s Not Our Breach
A cybersecurity firm says it has intercepted a large, unique stolen data set containing the names, addresses, email addresses, phone numbers, Social Security Numbers and dates of birth on nearly 23 million Americans. The firm's analysis of the data suggests…
·krebsonsecurity.com·
It Might Be Our Data, But It’s Not Our Breach
Techstrong TV: The Use of AI in Low-Code
Techstrong TV: The Use of AI in Low-Code
In this talk, Dave Wright, Chief Innovation Officer of ServiceNow, talks about how low-code is accelerating organizations’ AI journeys and is expanding
·devops.com·
Techstrong TV: The Use of AI in Low-Code