System Architecture

System Architecture

7447 bookmarks
Custom sorting
A Way to Replicate Data at the Edge
A Way to Replicate Data at the Edge
Edge data is exploding, but organizations’ struggles to pool the data together for where and when its developers, data scientists and other DevOps team members need it are among the challenges it poses. As a potential solution, InfluxData’s Edge Data Replication enables developers to collect, store and analyze high-precision time series data in InfluxDB at […]
·thenewstack.io·
A Way to Replicate Data at the Edge
API Gateway Vs. Service Mesh: What's the Difference?
API Gateway Vs. Service Mesh: What's the Difference?
While differences exist between an API gateway and a service mesh, it’s not an either/or situation. Here's why the two are compatible.
·devops.com·
API Gateway Vs. Service Mesh: What's the Difference?
How Kubernetes Reinvented Virtual Machines (in a good sense)
How Kubernetes Reinvented Virtual Machines (in a good sense)
How Virtual Machines are used to deploy services. What old problems containers solve and what new problems introduce. How Kubernetes used containers to recreate Virtual Machines?
·iximiuz.com·
How Kubernetes Reinvented Virtual Machines (in a good sense)
Brooks in Reverse
Brooks in Reverse
Fred Brooks observed in Mythical Man Month that adding more programmers to a project often slowed it down. The effect works in reverse, as Paul Graham noted in a 2001 essay, The Other Road Ahead: as groups get smaller, software development gets exponentially more efficient Graham was observing the early
·matt-rickard.com·
Brooks in Reverse
A First-Class Language Package Manager
A First-Class Language Package Manager
The history of modularization in JavaScript is a tedious one. ES Modules ("import") were introduced in 2015 and now seem to have broad support across different environments. But the precursor to ES Modules, CommonJS ("require"), is still widespread enough to require backward compatibility. And neither module system has an opinionated
·matt-rickard.com·
A First-Class Language Package Manager
Automating ACL's /w Capirca
Automating ACL's /w Capirca
This recording is part of the Packet Coders member Tech Sessions. Within this tech session we cover: What is Capirca? Overview of demo flows, and topology. Installation Components Integrations (SoT and Nornir) Demos ACL generation with CLI ACL generation with Python library Capirca integration with Nornir Challenge You can find
·packetcoders.io·
Automating ACL's /w Capirca
The story behind Google’s in-house desktop Linux
The story behind Google’s in-house desktop Linux
The best-known Google operating system is Chrome OS, but inside Google itself, the company also uses its own Linux desktop distro — gLinux.
·computerworld.com·
The story behind Google’s in-house desktop Linux
Practical Guide to Async, Threading & Multiprocessing
Practical Guide to Async, Threading & Multiprocessing
We discuss when you should async, threading and multiprocessing in Python and then we go through pitfalls in each multitasking option.
·itnext.io·
Practical Guide to Async, Threading & Multiprocessing
Securing Web APIs with Azure AD: Designing Authentication Schemes
Securing Web APIs with Azure AD: Designing Authentication Schemes
Posts in this series: A Case StudyDesigning Authentication SchemesIn our last post, I walked through my real-world scenario of needing to follow Zero Trust principles in securing microservice-based APIs inside (and outside) Azure. For our sample system, I'll simplify it a bit so that we have three applications: Server hosted
·jimmybogard.com·
Securing Web APIs with Azure AD: Designing Authentication Schemes
EOS free & open source icons
EOS free & open source icons
Commercial, non-commercial, use them as you please. EOS icons comes with an MIT license, has an open source community, and welcomes your collaboration too.
·eos-icons.com·
EOS free & open source icons
wasmCloud Documentation
wasmCloud Documentation
wasmCloud is a secure, distributed WebAssembly actor runtime
·wasmcloud.dev·
wasmCloud Documentation
4 Most Used REST API Authentication Methods
4 Most Used REST API Authentication Methods
There are any proprietary authentication methods and many variations of a few major approaches. Let's review the 4 most popular ones used by REST APIs
·blog.restcase.com·
4 Most Used REST API Authentication Methods
Keep track of innovations in digital banking
Keep track of innovations in digital banking
With Feedly’s new Neobanks AI model, you can effortlessly keep up with the growth and strategies of the world’s top 350 neobanks
·blog.feedly.com·
Keep track of innovations in digital banking
Why Observability Is Shifting Left
Why Observability Is Shifting Left
Why the “log everything and make sense later” approach to observability is broken.
·thenewstack.io·
Why Observability Is Shifting Left