System Architecture

System Architecture

7686 bookmarks
Custom sorting
What Makes Wasm Different
What Makes Wasm Different
Cosmonic's Liam Randall and Adobe's Colin Murphy discuss why Wasm’s future looks bright.
·thenewstack.io·
What Makes Wasm Different
The trouble with symbolic links
The trouble with symbolic links
At the 2022 sambaXP conference, Jeremy Allison gave a talk titled "The UNIX Filesystem API is profoundly broken: What to do about it?". LWN regulars may recall hints of these talks in a recent comment thread. He started his talk with the problems that symbolic links ("symlinks") cause for application developers, then discussed how the solutions to the problems posed by symlinks led to substantial increases in the complexity of the APIs involved in working with pathnames.
·lwn.net·
The trouble with symbolic links
The Biggest Myths
The Biggest Myths
Posts and writings by Lennart Poettering
·0pointer.de·
The Biggest Myths
A launchd Tutorial
A launchd Tutorial
A launchd primer covering configuration, administration and troubleshooting. Complete with examples.
·launchd.info·
A launchd Tutorial
The VS Code Server
The VS Code Server
Securely connect to and develop on any remote machine with the VS Code Server private preview.
·code.visualstudio.com·
The VS Code Server
Specs: Dropbox's Sixth Generation of Custom-Built Servers
Specs: Dropbox's Sixth Generation of Custom-Built Servers
File hosting service Dropbox released the details on its sixth generation of servers, a fleet optimized for a higher capacity, and lower latency.
·thenewstack.io·
Specs: Dropbox's Sixth Generation of Custom-Built Servers
5 Mean-Time Reliability Metrics To Follow
5 Mean-Time Reliability Metrics To Follow
Improving incident response is critical to maintain fully-functional systems. Here are five mean-time reliability metrics to help you do that.
·devops.com·
5 Mean-Time Reliability Metrics To Follow
What Do Authentication and Authorization Mean in Zero Trust?
What Do Authentication and Authorization Mean in Zero Trust?
The foundation of putting zero trust security principles into practice is #authentication and #authorization. The two practices work differently in zero trust than in other systems. #security #zerotrust #ITculture #DevOps
·thenewstack.io·
What Do Authentication and Authorization Mean in Zero Trust?
How (and Why) to Build a Welcoming Open Source Community
How (and Why) to Build a Welcoming Open Source Community
A few friendly words of encouragement and clear guidance are sometimes all it takes to welcome someone new to an open source community. This is true whether a new user or contributor shows up at an in-person or virtual event such as KubeCon Europe, which the AWS Open Source team attended this spring in Valencia, […]
·thenewstack.io·
How (and Why) to Build a Welcoming Open Source Community
Why its time to move away from Google Analytics
Why its time to move away from Google Analytics
Google Analytics is banned in some EU member states and more are likely to follow. Here is to why you should remove Google Analytics today.
·blog.simpleanalytics.com·
Why its time to move away from Google Analytics
Unpacking Cloud Native Buildpacks
Unpacking Cloud Native Buildpacks
Container images are a popular and standard format to package applications. Building secure, high performance container images can be challenging. Cloud native buildpacks provide solutions to create container images that are secure, high performance, and easy to deploy.
·pradeepl.com·
Unpacking Cloud Native Buildpacks
Applying Automation to DevOps
Applying Automation to DevOps
In the book, "Life and the Art of Engineering," author Haresh Sippy said, “Automation is cost-cutting by tightening the corners, not cutting them.” Today,
·devops.com·
Applying Automation to DevOps
Infrastructure-as-Code Goes Low Code/No Code
Infrastructure-as-Code Goes Low Code/No Code
DuploCloud hopes to disrupt infrastructure-as-code with its low code/no code solution that helps developers deploy in the cloud.
·thenewstack.io·
Infrastructure-as-Code Goes Low Code/No Code
How Much Reach Can a GraphQL API Have Over Other APIs?
How Much Reach Can a GraphQL API Have Over Other APIs?
At HasuraCon 2022, GraphQL specialist Hasura announced Hasura GraphQL Data Connector SDK, API evolution to support emerging data workloads, GraphQL DevOps improvements, and increased cloud-vendor availability.
·thenewstack.io·
How Much Reach Can a GraphQL API Have Over Other APIs?
Linux I/O Principles and Zero-copy Technology
Linux I/O Principles and Zero-copy Technology
Today’s network applications have shifted from CPU-intensive to I/O-intensive, and most of the network servers are based on the C-S model, i.e., the Client-Server model, which requires a lot of network communication between the client and the server, which also determines the performance bottleneck of modern network applications: I/O. The standard I/O interface of the traditional Linux operating system is based on data copy operations, i.e. I/O operations result in
·sobyte.net·
Linux I/O Principles and Zero-copy Technology
CDN Outages: Exploring Ways to Increase Resilience
CDN Outages: Exploring Ways to Increase Resilience
Issues at Content Delivery Network (CDN) providers caused several high-profile outages in recent years — here's how to increase resilience.
·thenewstack.io·
CDN Outages: Exploring Ways to Increase Resilience
The Social Model of Open Source
The Social Model of Open Source
Cisco’s Open Source Tech Leader Julia Ferraioli shares some alternative ways to define what is and is not ‘open source.’
·thenewstack.io·
The Social Model of Open Source
Software architecture diagramming and patterns
Software architecture diagramming and patterns
A software’s architecture is the foundation for any successful software system and will influence everything from maintainability…
·learningdaily.dev·
Software architecture diagramming and patterns
Things Elixir's Phoenix Framework Does Right
Things Elixir's Phoenix Framework Does Right
I dabbled in Phoenix for a while now, but never really got my hands dirty with it right up until now. Apart from the whole framework being surprisingly well thought through, there are a few things that strike me as being done exceptionally well in Phoenix, compared to the rest of modern web frameworks. 1. Striking a balance between flexibility and strictness Modern web frameworks can be roughly divided into two camps:
·scorpil.com·
Things Elixir's Phoenix Framework Does Right
Exploring Graphs with Elixir
Exploring Graphs with Elixir
This hands-on book will quickly get you building, querying, and comparing graph data models using a robust, concurrent programming language—Elixir.
·pragprog.com·
Exploring Graphs with Elixir
Not Just Elixir — Also Graphs
Not Just Elixir — Also Graphs
Explore Graph Models and Databases for Large and Irregular Data Sets
·medium.com·
Not Just Elixir — Also Graphs
Firezone: Open-Source WireGuard VPN Server
Firezone: Open-Source WireGuard VPN Server
Firezone is an open-source VPN server and egress firewall built on the new blazing fast WireGuard tunneling protocol. It's the simplest way to set up secure remote access to your private resources with MFA, SSO, REST API, and other useful automation. Firezone is lightweight and easy to set up while being up to 3-4x faster than alternative solutions like OpenVPN and IPsec.
·firezone.dev·
Firezone: Open-Source WireGuard VPN Server