Sufficiently Decentralized

System Architecture
Rust-based platform for the Web – SWC
SWC is an extensible Rust-based platform for the next generation of fast developer tools. It's used by tools like Next.js, Parcel, and Deno, as well as companies like Vercel, ByteDance, Tencent, Shopify, and more.
The New Wave Frontend Toolchain
The End-to-End Principle in System Design
Ampere Computing® | Cloud Native Processors, CPUs, Data Center Solutions
Ampere Computing® - Creator of the first cloud native processors – the 80 core Ampere® Altra® and 128 core Ampere® Altra® Max CPUs and Server Systems
ARM Server Chips Get a Boost with Ampere’s Altra
With its chips recently adopted by Google Cloud and HPE, Ampere Computing is giving ARM-based chips the kind of server breakthrough that has eluded other chip companies. These companies' backing provides a big boost to the entire ARM server ecosystem.
Managing Secrets in Your DevOps Pipeline
This article will discuss best practices for secrets management in the context of continuous integration delivery workflow.
Why Developers Need a Management Plane
Management planes can become a happy ops medium that saves developers days or weeks of time wasted on configuration management, security design and more.
E Pluribus, Network – Arista Networks, That Is
Software is not actually eating the world, but it is absolutely smashing out of appliance-style boxes and creating a massive, interconnected overlay atop
Observability Is Shifting Left, Following Security and Ops
Giving developers more power in the software development life cycle yields tremendous benefits for both developers and the companies they work for
Why We Built an Open Source ML Model Registry with git
But there are challenges to adopting a machine learning model registry. We found that to address those challenges, a model registry with a GitOps-based approach was needed.
A security-module hook for user-namespace creation
The Linux Security Module (LSM) subsystem works by way of an extensive set
of hooks placed strategically throughout the kernel. Any specific security
module can attach to the hooks for the behavior it intends to govern and be
consulted whenever a decision needs to be made. The placement of LSM hooks
often comes with a bit of controversy; developers have been known to object
to the
performance cost of hooks in hot code paths, and sometimes there are misunderstandings over how integration with
LSMs should be handled. The disagreement over a security hook for the
creation of user namespaces, though, is based on a different sort of
concern.
MinIO slams Nutanix use of open source code: round 2 – Blocks and Files
MinIO has accused Nutanix of actively misleading industry and financial analysts by telling them it was no longer using MinIO code in its Objects product when in fact it was, or so it’s claimed. MinIO CFO Garima Kapoor followed up her first blog accusing Nutanix of open source code license infractions with a second. In […]
Securing Web APIs with Azure AD: Building the Server
Posts in this series: A Case StudyDesigning Authentication SchemesAuthorizing Client ApplicationsBuilding the ServerFull example In the last couple of posts, we looked at authentication and authorization options and picked some strategies for each. With those pieces chosen, we can now set about building our server and client applications as well
Generate Code just by typing a text description. AI will help you to generate the code in a few seconds.
A tool for programming and much more. Generate Code just by typing a text description. AI will help you to generate the code in a few seconds.Generate Code just by typing a text description. AI will help you to generate the code in a few seconds.
Is Kubernetes Adoption Slowing?
Kubernetes is also becoming more embedded in other systems, so its adoption may not be as visible as it once was.
Confidential Computing with WebAssembly
Enarx, an open source project built on #WASM, is at the core of a solution to attestation hurdles that prevents sensitive #data from moving to the cloud. #WebAssembly #opensource #enarx
What Trivago Learned Adopting TypeScript
There’s a learning curve when moving from JavaScript to TypeScript and it does slow down the average pace of code writing. The time dedicated to thinking about the flow of data moving through the application, is well worth it in the long run.
Introducing Cute: RPC the way it was always meant to be
The Cute server is a Qt-based server that enables developers to seamlessly use the Qt's signals and slots mechanism over a network.
The story of a Noob
From “Hello World” to Architect
MyMap (HashCompactor rewrite) by Kevin J. Crosby
Why Study Functional Programming?
Does your data fit in RAM?
Can Data Privacy Vaults Have APIs? Yes!
If you work with sensitive data, using a data privacy vault is a great way to protect that data without sacrificing data utility
Power to the People
Why is John Gage, a bearded old Berkeley troublemaker, carrying the corporate flag for the Pentagon's favorite computer maker?
Jonathan Schwartz's Weblog
Learn about Java Card technology
You can now store and update multiple applications on a single resource-constrained device, while retaining the highest certification levels of compatibility.
Understanding Java Card 2.0
Java Card is a smart card that is capable of running programs
written in Java. For this new Java platform, Sun's JavaSoft
division has made available the Java Card 2.0 API specification,
and several licensees are now implementing this API on smart cards.
In order to program Java Cards that are 2.0-compliant, developers
need to understand what a Java Card is architecturally, what its
core classes are, and how to develop applications for the card.
The previous articles in the Java Developer
series on smart cards provided an overview of smart cards,
described how to deploy applications that talk to a Java Card using
OpenCard interface, and discussed the business opportunities
represented by the Java Card. This article gets inside a Java Card,
providing you, the developer, with technical guidance on the system
architecture, application programming interface, and runtime
environment of the Java platform in a smart card. (4,000
words)
Javacardarch
The Network is the Computer. Part 1 – Foundations: The Unfulfilled Promise - Aptira
This series of posts looks at the evolution of Open Networking & how it became what it is today. In this post, we will start with the Infrastructure domain.