System Architecture

System Architecture

7672 bookmarks
Custom sorting
Instagram, TikTok, and the Three Trends
Instagram, TikTok, and the Three Trends
Trends in medium, AI, and user interaction underpin Instagram’s response to TikTok, and will determine Meta’s long-term moat.
·stratechery.com·
Instagram, TikTok, and the Three Trends
41. World Building And Alternate Reality Common Lisp
41. World Building And Alternate Reality Common Lisp
Time for another Interlude, wherein I take a break from my career journey and reflect on what we're doing. I say we, not because I have…
·kaveh808.medium.com·
41. World Building And Alternate Reality Common Lisp
A look inside an EPUB file
A look inside an EPUB file
eBooks provide a great way to read books, magazines, and other content on the go. Readers can enjoy eBooks to pass the time during long flights and train rides.
·opensource.com·
A look inside an EPUB file
The Rogers Outage of 2022: Takeaways for SREs
The Rogers Outage of 2022: Takeaways for SREs
The Rogers outage is a lesson in the importance of testing, redundant infrastructure and transparent communications before a crisis.
·devops.com·
The Rogers Outage of 2022: Takeaways for SREs
Putting LiveView in a Chrome Extension
Putting LiveView in a Chrome Extension
Google Chrome extension that displays a LiveView and integrates with Gmail? Steve Bussey shares how he did just that! We learn how and why he did it. He shares tips for others who want to do it too!
·podcast.thinkingelixir.com·
Putting LiveView in a Chrome Extension
Cockroach Labs, the company building CockroachDB
Cockroach Labs, the company building CockroachDB
CockroachDB is a distributed database with standard SQL for cloud applications. CockroachDB powers companies like Comcast, Lush, and Bose.
·cockroachlabs.com·
Cockroach Labs, the company building CockroachDB
Data Security Services | comforte
Data Security Services | comforte
We provide software solutions to protect and manage data that organizations have been entrusted to secure
·comforte.com·
Data Security Services | comforte
Hashing vs. Encryption vs. Encoding vs. Obfuscation
Hashing vs. Encryption vs. Encoding vs. Obfuscation
This article concisely explains the differences between encryption, encoding, hashing, and obfuscation. Includes multiple examples of each…
·danielmiessler.com·
Hashing vs. Encryption vs. Encoding vs. Obfuscation
Event Driven Architecture — 5 Pitfalls to Avoid
Event Driven Architecture — 5 Pitfalls to Avoid
5 pitfalls that Wix engineers have encountered with event driven architecture. Battle-tested proven solutions are provided for each…
·natansil.medium.com·
Event Driven Architecture — 5 Pitfalls to Avoid
Best Practices for Maintainers
Best Practices for Maintainers
Making your life easier as an open source maintainer, from documenting processes to leveraging your community.
·opensource.guide·
Best Practices for Maintainers
Spotify’s Event Delivery – The Road to the Cloud (Part I) - Spotify Engineering
Spotify’s Event Delivery – The Road to the Cloud (Part I) - Spotify Engineering
Whenever a user performs an action in the Spotify client—such as listening to a song or searching for an artist—a small piece of information, an event, is sent to our servers. Event delivery, the process of making sure that all events gets transported safely from clients all over the world to our central processing system, [...]
·engineering.atspotify.com·
Spotify’s Event Delivery – The Road to the Cloud (Part I) - Spotify Engineering
Kubernetes StatefulSets are Broken
Kubernetes StatefulSets are Broken
Kubernetes was originally intended to act as a container orchestration platform for stateless workloads, not stateful apps.
·plural.sh·
Kubernetes StatefulSets are Broken
Asdf Performance - Stratus3D
Asdf Performance - Stratus3D
I’ve been a maintainer of asdf for about 6 years now. Most of my work these last several years has been fixing bugs, writing automated tests …
·stratus3d.com·
Asdf Performance - Stratus3D
AWS unveils private 5G network
AWS unveils private 5G network
Well, more like 4G LTE right now, and you'll probably need someone to put up the radio
·theregister.com·
AWS unveils private 5G network
Analyzing the Security of eBPF Maps | CrowdStrike
Analyzing the Security of eBPF Maps | CrowdStrike
Take a deep dive into the security implications for eBPF users by exploring how eBPF is used in Linux and Cloud environments, and how it can be abused by attackers.
·crowdstrike.com·
Analyzing the Security of eBPF Maps | CrowdStrike
Data Mesh: What is it and What Does it Mean for Data Engineers?
Data Mesh: What is it and What Does it Mean for Data Engineers?
Data Mesh draws its concepts from software engineering best practices such as micro and agile development. Applying those concepts to data operations is rewarding if successfully implemented.
·lakefs.io·
Data Mesh: What is it and What Does it Mean for Data Engineers?