System Architecture

System Architecture

7686 bookmarks
Custom sorting
Open-sourcing Katran, a scalable network load balancer
Open-sourcing Katran, a scalable network load balancer
Katran creates a software-based solution to load balancing with a reengineered forwarding plane that takes advantage of recent innovations in kernel engineering. [...]Read More...
·engineering.fb.com·
Open-sourcing Katran, a scalable network load balancer
Small, Sharp Tools
Small, Sharp Tools
A few words on the Unix philosophy of building small programs that do one thing well, and compose for comprehensive functionality.
·brandur.org·
Small, Sharp Tools
DNS-over-HTTP/3 in Android
DNS-over-HTTP/3 in Android
Posted by Matthew Maurer and Mike Yu, Android team To help keep Android users’ DNS queries private, Android supports encrypted DNS. I...
·security.googleblog.com·
DNS-over-HTTP/3 in Android
Experts say CIA security triad needs a DIE model upgrade
Experts say CIA security triad needs a DIE model upgrade
The CIA security triad, a security policy model built on confidentiality, integrity and availability, worked for decades. Two security experts see the DIE triad, which stands for distributed, immutable and ephemeral, as the next major security paradigm.
·techtarget.com·
Experts say CIA security triad needs a DIE model upgrade
What is FIDO 2?
What is FIDO 2?
Learn more about FIDO2, the passwordless evolution of FIDO U2F, from one of the leaders in the multi-factor security key industry, Yubico.
·yubico.com·
What is FIDO 2?
Authelia
Authelia
Authelia is an open-source authentication and authorization server and portal fulfilling the identity and access management (IAM) role of information security in providing multi-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion for common reverse proxies.
·authelia.com·
Authelia
Event-driven architecture explained in a coloring book
Event-driven architecture explained in a coloring book
Event-driven architecture is no small topic. A coloring book is a perfect way to explain its complexity in a friendly manner. Download this coloring book about event-driven architecture
·opensource.com·
Event-driven architecture explained in a coloring book
Untangling Enterprise API Architecture with GraphQL
Untangling Enterprise API Architecture with GraphQL
GraphQL can help untangle services by providing clients with a single endpoint where they can get all their data and interact with it uniformly.
·thenewstack.io·
Untangling Enterprise API Architecture with GraphQL
The BPF panic function
The BPF panic function
One of the key selling points of the BPF subsystem is that loading a BPF program is safe: the BPF verifier ensures that the program cannot hurt the kernel before allowing the load to occur. That guarantee is perhaps losing some of its force as more capabilities are made available to BPF programs but, even so, it may be a bit surprising to see this proposal from Artem Savkov adding a BPF helper that is explicitly designed to crash the system. If this patch set is merged in something resembling its current form, it will be the harbinger of a new era where BPF programs are, in some situations at least, allowed to be overtly destructive.
·lwn.net·
The BPF panic function
System Design Interview: Search Engine
System Design Interview: Search Engine
Level up your system design skills and land a job quickly. Try these system design practice problems today
·hackpack.io·
System Design Interview: Search Engine
Thoughts on RSS
Thoughts on RSS
No technology other than RSS has had more think pieces written proclaiming the death of RSS (2006, 2009, 2010, 2012, 2013) and the rebirth of RSS (2009, 2010, 2011, 2018, 2018, 2019). Really Simple Syndication (RSS) is a protocol that lets you subscribe to website updates – e.g., new blog
·matt-rickard.com·
Thoughts on RSS
3 Ways API Catalogs Can Help DevOps Security
3 Ways API Catalogs Can Help DevOps Security
It's not enough to discover APIs. Organizations must catalog APIs, including automating discovery and assessing risks.
·thenewstack.io·
3 Ways API Catalogs Can Help DevOps Security
Load Testing: An Unorthodox Guide
Load Testing: An Unorthodox Guide
You can use this guide to understand how to properly execute load tests, what data to collect during load tests and how to interpret that data.
·marcobehler.com·
Load Testing: An Unorthodox Guide
Decentralized Identifiers (DIDs) v1.0
Decentralized Identifiers (DIDs) v1.0
Decentralized identifiers (DIDs) are a new type of identifier that enables verifiable, decentralized digital identity. A DID refers to any subject (e.g., a person, organization, thing, data model, abstract entity, etc.) as determined by the controller of the DID. In contrast to typical, federated identifiers, DIDs have been designed so that they may be decoupled from centralized registries, identity providers, and certificate authorities. Specifically, while other parties might be used to help enable the discovery of information related to a DID, the design enables the controller of a DID to prove control over it without requiring permission from any other party. DIDs are URIs that associate a DID subject with a DID document allowing trustable interactions associated with that subject.
·w3.org·
Decentralized Identifiers (DIDs) v1.0
KAIST Shows Off DirectCXL Disaggregated Memory Prototype
KAIST Shows Off DirectCXL Disaggregated Memory Prototype
The hyperscalers and cloud builders are not the only ones having fun with the CXL protocol and its ability to create tiered, disaggregated, and composable
·nextplatform.com·
KAIST Shows Off DirectCXL Disaggregated Memory Prototype
GitOps
GitOps
GitOps is a methodology for continuous deployment using a Git repository as the single source of truth. The repository contains the YAML manifests or Helm charts for the Kubernetes resources to be created. The Git repo is used to store, track and version control changes to these YAML files.
·pradeepl.com·
GitOps