System Architecture

System Architecture

7447 bookmarks
Custom sorting
The Network is the Computer: A Conversation with John Gage
The Network is the Computer: A Conversation with John Gage
To learn more about the origins of “The Network is the Computer,” I spoke with John Gage, the creator of the phrase and the 21st employee of Sun Microsystems. John had a key role in shaping the vision of Sun and had a lot to share about his vision for the future.
·blog.cloudflare.com·
The Network is the Computer: A Conversation with John Gage
The Network Is The Computer, Again
The Network Is The Computer, Again
Today, the old Sun Microsystems tagline rings truer than ever. In our cloud-centric world, perhaps computers don't exist at all anymore.
·networkcomputing.com·
The Network Is The Computer, Again
Why We Need Containerized Host-Based Protection
Why We Need Containerized Host-Based Protection
Containerized workloads have long become the de facto standard deployment model for enterprise applications. However, there is still some…
·itnext.io·
Why We Need Containerized Host-Based Protection
No SOCKS, No Shoes, No Malware Proxy Services!
No SOCKS, No Shoes, No Malware Proxy Services!
With the recent demise of several popular "proxy" services that let cybercriminals route their malicious traffic through hacked PCs, there is now something of a supply chain crisis gripping the underbelly of the Internet. Compounding the problem, several remaining malware-based…
·krebsonsecurity.com·
No SOCKS, No Shoes, No Malware Proxy Services!
Securing Web APIs with Azure AD: Authorizing Client Applications
Securing Web APIs with Azure AD: Authorizing Client Applications
Posts in this series: A Case StudyDesigning Authentication SchemesAuthorizing Client ApplicationsIn our last post, we chose the OAuth 2.0 Client Credentials grant scheme to authenticate our APIs and daemon applications: API and daemon application calling an internal APIOnce we go the route of performing "service account"-based authentication, our
·jimmybogard.com·
Securing Web APIs with Azure AD: Authorizing Client Applications
SemVer might not be right for you
SemVer might not be right for you
Methodical release of software is a crucial part of the development lifecycle. After the hard work producing the software it would be a…
·codereviewdoctor.medium.com·
SemVer might not be right for you
The Casio employee that revolutionized reggae #ArtTuesday
The Casio employee that revolutionized reggae #ArtTuesday
The “Sleng Teng” riddim revolutionized reggae music in the mid-1980s, and has spawned hundreds of versions in the decades since then. Less well known is the story of how the distinctive bassline or…
·blog.adafruit.com·
The Casio employee that revolutionized reggae #ArtTuesday
How VHS Beat Betamax & Changed Media Forever
How VHS Beat Betamax & Changed Media Forever
Some of my earliest childhood memories involve watching grainy VHS movies over and over on a huge 80’s floor model TV. Over the years there have been many format wars – Betamax vs VHS w…
·blog.adafruit.com·
How VHS Beat Betamax & Changed Media Forever
Automate Anomaly Detection for Time Series Data
Automate Anomaly Detection for Time Series Data
SaaS platform Ezako’s commitment to improving machine learning on time series data significantly accelerates key processes that ML data scientists face.
·thenewstack.io·
Automate Anomaly Detection for Time Series Data
Three Key Steps To Going Multi-Cloud
Three Key Steps To Going Multi-Cloud
There's a three-step process for transitioning to a multi-cloud strategy, and cloud resource optimization can help you make the move.
·devops.com·
Three Key Steps To Going Multi-Cloud
Why AI and machine learning are drifting away from the cloud
Why AI and machine learning are drifting away from the cloud
Cloud computing isn’t going anywhere, but some companies are shifting their machine learning data and models to their own machines they manage in-house. Adopters are spending less money and getting better performance.
·protocol.com·
Why AI and machine learning are drifting away from the cloud
5 Tips for Native Developers to Optimize API Security
5 Tips for Native Developers to Optimize API Security
In case you missed it, we’re living in the age of API insecurity. Gartner predicts that API breaches will become the leading attack vector in 2022. You don’t need to look far to read about how an API security flaw led to massive attacks against organizations like LinkedIn, Parler and Clubhouse. As APIs are becoming […]
·thenewstack.io·
5 Tips for Native Developers to Optimize API Security
How Cloudflare emerged to take on AWS, Azure, and GCP
How Cloudflare emerged to take on AWS, Azure, and GCP
The upstart internet security and edge infrastructure company has reinvented itself to challenge the hyperscale cloud providers. Can it succeed?
·infoworld.com·
How Cloudflare emerged to take on AWS, Azure, and GCP
InfoQ Software Architecture & Design Trends 2022
InfoQ Software Architecture & Design Trends 2022
Each year, InfoQ editors discuss what we’ve been observing across the entire software development landscape, and create several trends reports, each with its own graph of the adoption curve. This helps the editorial team focus its reporting on innovative technologies and ideas, and also provides our readers with a high-level overview of topics to keep an eye on.
·infoq.com·
InfoQ Software Architecture & Design Trends 2022
Setup VSCode for Elixir Dev
Setup VSCode for Elixir Dev
Setup Microsoft Visual Studio Code (VS Code) for productive Elixir development.
·fly.io·
Setup VSCode for Elixir Dev
Exploring Options for Storing Custom Data in Ecto
Exploring Options for Storing Custom Data in Ecto
Ever wanted to store a blob of custom data on a database record? When the data is stored using Ecto there are several ways we can do it. This article explores two paths and discusses some of the pros and cons for each approach.
·fly.io·
Exploring Options for Storing Custom Data in Ecto