Wikipedia’s definition of a digital signature is: A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature on a messag…
Explore the benefits and limitations of using the sidecar design pattern and the specific use cases where it is most appropriate. Learn how to determine whether a sidecar is a suitable choice for a particular scenario, as well as how to implement sidecars to maximize their benefits.
Reading the Generalized Isolation Level Definitions paper with Alloy
My last few blog posts have been about how I used TLA+ to gain a better understanding of database transaction consistency models. This post will be in the same spirit, but I’ll be using a dif…
System Design Part 1: Setup a Simple Load Balancer using Python - Conrad's Blog - Insights on Technology Leadership and Software Engineering
Unlock the fundamentals of system design with our guide to building a load balancer. Learn how load balancing distributes traffic, optimizes resources, and enhances application reliability by providing redundancy and handling high traffic efficiently
How some of the world's most brilliant computer scientists got password policies so wrong
The US government’s latest recommendations acknowledge that password composition and reset rules are not just annoying, but counterproductive.
The story of why password rules were recommended and enforced without scientific evidence since their invention in 1979 is a story of brilliant people, at the very top of their field, whose well-intentioned recommendations led to decades of ignorance. These mistakes are worth studying, in part, because the people making them were so damn brilliant and the consequences were so long lasting.
Design discussion - Ecto is your application - Chat / Discussions - Elixir Programming Language Forum
Hello, everyone! This should probably be a blog post, but I don’t have a blog, so here we go 😄 My thoughts and frustrations regarding domain modeling in the face of persistence, distilled into a few paragraphs. I’m interested in your opinions. This is probably going to get a bit philosophical, but hopefully also stay practical. I’d like to talk about the age old problem of ORMs. And when it comes to the impedance mismatch problem, Ecto is in the exact same situation as any other ORM in ot...
Comparing the outbox pattern to alternatives like “listen-to-yourself” and 2-phase commit (2PC) transactions. What’s the best choice for data exchange flows between microservices?
WebVM 2.0: A complete Linux Desktop Environment in the browser via WebAssembly
WebVM is a full Linux environment running in the browser, client-side. It is a complete virtual machine, with support for persistent data storage, networking and, as of today’s release, Xorg and complete desktop environments.
This article will explain the WebVM architecture, how the main components work, and what you can build with this technology.
Hurry-up offense: NFL builds terabit network in one week for Munich game
Setting up a terabit network overseas and operating it securely – the NFL showed how it's done for the matchup between the New York Giants and Carolina Panthers in Munich.
Nomadic Infrastructure Design for AI Workloads | Tigris Object Storage
This AI stuff is cool, but GPU inference is not needed all of the time. Most of the time your instances stay idle, which means you're just burning investor money without any real benefit. Today we'll learn how to make your compute spread between hosts nomadically, hunting deals and using Tigris to make it all possible.
The Key Fundamentals of Programming You Should Know
Before diving into any specific programming language, aspiring developers should master these essential concepts that form the foundation of all software development.
The Back End AI Network Puts Pressure On The Front End
For most of the history of high performance computing, a supercomputer was a freestanding, isolated machine that was designed to run some simulation or
If you were to design an open social networking protocol, what would that look like? Which metaphors and comparisons would you use to get a general idea of how the network functions? And what would you answer if people ask if your network is decentralised and federated?