How We Made Data Aggregation Better and Faster on PostgreSQL With TimescaleDB 2.7
They’re so fast we can’t catch up! Check out our benchmarks with two datasets to learn how we used continuous aggregates to make queries up to 44,000x faster, while requiring 60 % less storage (on average).
by Karl-Rainer Blumenthal, Web Archivist for Archive-It Want to know more about a tool in our web archiving toolbox? Your suggestions or questions for future posts about Archive-It technology are i.../i
For the 447th episode of Stack Overflow’s podcast, GitHub’s former Chief Technology Officer Jason Warner shared some fascinating tales of tech transformation. The conversation covered both the massive scaling effort at GitHub from May 2017 to July 2021 and the story of Warner’s own “non-traditional” path into programming from “farm country” in Connecticut. Maybe both […]
JIT/GPU accelerated deep learning for Elixir with Axon v0.1
I am excited to announce the official v0.1.0 release of Axon and AxonOnnx. A lot has changed (and improved) since the initial public announcement of Axon. In this post I will explore Axon and its i…
Distributed caching is important for cloud-based applications. It facilitates incremental scaling, allowing the cache to grow and incorporate more data.
Leonid Belkind, co-founder of Torq, discusses the ideas behind zero trust and how the strategy works in practice. This is another excerpt from our new ebook, sponsored by Torq. #security #zerotrust #cloudnative #sponsored
Nametag | Securely Sign in with ID, Enhance Support with ID Check
Use Nametag to securely access your accounts with passwordless digital ID & authenticate customers with biometric face matching. Nametag offers a maximum security solution while maintaining privacy and efficiency for customers.
Zero Trust Architecture (ZTA) builds on the foundational principles of zero trust security as defined by the National Institute of Standards and Technology (NIST) in publication 800-207. NIST recommends a focus on users, assets, and resources rather than traditional network boundary defenses. At the most basic level, it consists of a design philosophy where nothing […]
Here’s the key takeaway from this post: use the scientific method to deal with bugs, rather than relying only on your intuition—never assume “ghosts” are influencing your code, infrastructure, libraries, or even making fun of you through the Internet. Has this ever happened to you? You’re a developer sitting at your desk. Suddenly, a fellow […]