System Architecture

System Architecture

7363 bookmarks
Custom sorting
Digital signatures and how to avoid them
Digital signatures and how to avoid them
Wikipedia’s definition of a digital signature is: A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature on a messag…
·neilmadden.blog·
Digital signatures and how to avoid them
What's so bad about sidecars, anyway? | Cerbos
What's so bad about sidecars, anyway? | Cerbos
Explore the benefits and limitations of using the sidecar design pattern and the specific use cases where it is most appropriate. Learn how to determine whether a sidecar is a suitable choice for a particular scenario, as well as how to implement sidecars to maximize their benefits.
·cerbos.dev·
What's so bad about sidecars, anyway? | Cerbos
slash pages
slash pages
A guide to common pages you can add to your website
·slashpages.net·
slash pages
Home | Infinigen
Home | Infinigen
Description will go into a meta tag in head /
·infinigen.org·
Home | Infinigen
Alloytools
Alloytools
·alloytools.org·
Alloytools
Reading the Generalized Isolation Level Definitions paper with Alloy
Reading the Generalized Isolation Level Definitions paper with Alloy
My last few blog posts have been about how I used TLA+ to gain a better understanding of database transaction consistency models. This post will be in the same spirit, but I’ll be using a dif…
·surfingcomplexity.blog·
Reading the Generalized Isolation Level Definitions paper with Alloy
System Design Part 1: Setup a Simple Load Balancer using Python - Conrad's Blog - Insights on Technology Leadership and Software Engineering
System Design Part 1: Setup a Simple Load Balancer using Python - Conrad's Blog - Insights on Technology Leadership and Software Engineering
Unlock the fundamentals of system design with our guide to building a load balancer. Learn how load balancing distributes traffic, optimizes resources, and enhances application reliability by providing redundancy and handling high traffic efficiently
·conradlotz.com·
System Design Part 1: Setup a Simple Load Balancer using Python - Conrad's Blog - Insights on Technology Leadership and Software Engineering
How some of the world's most brilliant computer scientists got password policies so wrong
How some of the world's most brilliant computer scientists got password policies so wrong
The US government’s latest recommendations acknowledge that password composition and reset rules are not just annoying, but counterproductive. The story of why password rules were recommended and enforced without scientific evidence since their invention in 1979 is a story of brilliant people, at the very top of their field, whose well-intentioned recommendations led to decades of ignorance. These mistakes are worth studying, in part, because the people making them were so damn brilliant and the consequences were so long lasting.
·stuartschechter.org·
How some of the world's most brilliant computer scientists got password policies so wrong
Fruits & Roots
Fruits & Roots
The forest offers much but demands much too
·tidyfirst.substack.com·
Fruits & Roots
Design discussion - Ecto is your application - Chat / Discussions - Elixir Programming Language Forum
Design discussion - Ecto is your application - Chat / Discussions - Elixir Programming Language Forum
Hello, everyone! This should probably be a blog post, but I don’t have a blog, so here we go 😄 My thoughts and frustrations regarding domain modeling in the face of persistence, distilled into a few paragraphs. I’m interested in your opinions. This is probably going to get a bit philosophical, but hopefully also stay practical. I’d like to talk about the age old problem of ORMs. And when it comes to the impedance mismatch problem, Ecto is in the exact same situation as any other ORM in ot...
·elixirforum.com·
Design discussion - Ecto is your application - Chat / Discussions - Elixir Programming Language Forum
Revisiting the Outbox Pattern
Revisiting the Outbox Pattern
Comparing the outbox pattern to alternatives like “listen-to-yourself” and 2-phase commit (2PC) transactions. What’s the best choice for data exchange flows between microservices?
·decodable.co·
Revisiting the Outbox Pattern
WebVM 2.0: A complete Linux Desktop Environment in the browser via WebAssembly
WebVM 2.0: A complete Linux Desktop Environment in the browser via WebAssembly
WebVM is a full Linux environment running in the browser, client-side. It is a complete virtual machine, with support for persistent data storage, networking and, as of today’s release, Xorg and complete desktop environments. This article will explain the WebVM architecture, how the main components work, and what you can build with this technology.
·labs.leaningtech.com·
WebVM 2.0: A complete Linux Desktop Environment in the browser via WebAssembly
Nomadic Infrastructure Design for AI Workloads | Tigris Object Storage
Nomadic Infrastructure Design for AI Workloads | Tigris Object Storage
This AI stuff is cool, but GPU inference is not needed all of the time. Most of the time your instances stay idle, which means you're just burning investor money without any real benefit. Today we'll learn how to make your compute spread between hosts nomadically, hunting deals and using Tigris to make it all possible.
·tigrisdata.com·
Nomadic Infrastructure Design for AI Workloads | Tigris Object Storage
Message Queues in System Design
Message Queues in System Design
Learn the basics of message queues and how they enhance system design for modern software development.
·levelup.gitconnected.com·
Message Queues in System Design
The Key Fundamentals of Programming You Should Know
The Key Fundamentals of Programming You Should Know
Before diving into any specific programming language, aspiring developers should master these essential concepts that form the foundation of all software development.
·thenewstack.io·
The Key Fundamentals of Programming You Should Know
The Back End AI Network Puts Pressure On The Front End
The Back End AI Network Puts Pressure On The Front End
For most of the history of high performance computing, a supercomputer was a freestanding, isolated machine that was designed to run some simulation or
·nextplatform.com·
The Back End AI Network Puts Pressure On The Front End
A conceptual model of ATProto and ActivityPub
A conceptual model of ATProto and ActivityPub
If you were to design an open social networking protocol, what would that look like? Which metaphors and comparisons would you use to get a general idea of how the network functions? And what would you answer if people ask if your network is decentralised and federated?
·fediversereport.com·
A conceptual model of ATProto and ActivityPub
Bento
Bento
Insights into performance-related data made accessible.
·benbeben.vercel.app·
Bento