System Architecture

System Architecture

7691 bookmarks
Custom sorting
Text Classification Intuition for Software Developers
Text Classification Intuition for Software Developers
Large language models can solve various language tasks, like classifying text into different labels. In this post, we look at two examples of Classification.
·txt.cohere.ai·
Text Classification Intuition for Software Developers
EcoStruxure IT | Schneider Electric
EcoStruxure IT | Schneider Electric
EcoStruxure IT helps you mitigate and anticipate risk of failure of critical infrastructure and reduce operational expenses through a vendor-agnostic platform
·ecostruxureit.com·
EcoStruxure IT | Schneider Electric
Vetting the cargo
Vetting the cargo
Modern language environments make it easy to discover and incorporate externally written libraries into a program. These same mechanisms can also make it easy to inadvertently incorporate security vulnerabilities or overtly malicious code, which is rather less gratifying. The stream of resulting vulnerabilities seems like it will never end, and it afflicts relatively safe languages like Rust just as much as any other language. In an effort to avoid the embarrassment that comes with shipping vulnerabilities (or worse) by way of its dependencies, the Mozilla project has come up with a new supply-chain management tool known as "cargo vet".
·lwn.net·
Vetting the cargo
Toward a lexicon for advertising in both directions
Toward a lexicon for advertising in both directions
We need a lexicon for the different ways buyers and sellers express their intentions to each other. Or, one might say, advertise. On the demand side (⊂) we have what in ProjectVRM we’ve calle…
·blogs.harvard.edu·
Toward a lexicon for advertising in both directions
the hard problem: naming functions and other gizmos
the hard problem: naming functions and other gizmos
The previous post discussed the subtle arts of naming things and not repeating yourself--and now I want to extend its observations beyond functions. That post teased out 3 intuitions about writing lower-churn code:
·t-ravis.com·
the hard problem: naming functions and other gizmos
How we think about browsers | The GitHub Blog
How we think about browsers | The GitHub Blog
Discover how GitHub thinks about browser support, look at usage patterns, and learn about the tools we use to make sure our customers are getting the best experience.
·github.blog·
How we think about browsers | The GitHub Blog
Developer Velocity Lab - Microsoft Research
Developer Velocity Lab - Microsoft Research
Developer Velocity Lab (DVL) is a joint effort between GitHub, Microsoft, and Microsoft Research, whose mission is to discover, improve, and amplify developer work and well-being. We do this through socio-technical investigations in the following focus areas: Productivity, Community, Well-being
·microsoft.com·
Developer Velocity Lab - Microsoft Research
The SPACE of Developer Productivity: There's more to it than you think - Microsoft Research
The SPACE of Developer Productivity: There's more to it than you think - Microsoft Research
Developer productivity is about more than an individual’s activity levels or the efficiency of the engineering systems relied on to ship software, and it cannot be measured by a single metric or dimension. The SPACE framework captures different dimensions of productivity, and here we demonstrate how this framework can be used to understand productivity in […]
·microsoft.com·
The SPACE of Developer Productivity: There's more to it than you think - Microsoft Research
Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat
Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat
Symbiote is a new Linux® malware we discovered that acts in a parasitic nature, infecting other running processes to inflict damage on machines.
·intezer.com·
Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat
HTTP Security Headers: The Best Practices
HTTP Security Headers: The Best Practices
Initially used for simple metadata, HTTP headers now play an important role in the vast field that web security is. Setting up HTTP security headers is the quickest, less expensive, and probably the most effective way to secure a web application today. Here is how. But first, you may be
·kerkour.com·
HTTP Security Headers: The Best Practices
ExtremeCloud™ IQ
ExtremeCloud™ IQ
Create effortless networking experiences with ExtremeCloud™ IQ, backed by unprecedented cloud choice. Astonishingly easy, incredibly smart. Streamline every aspect of your network from deployment to maintenance.
·extremenetworks.com·
ExtremeCloud™ IQ
Why We're Sticking with Ruby on Rails at GitLab
Why We're Sticking with Ruby on Rails at GitLab
With our modular monolith, developers can contribute enhancements to the core product, giving us tremendous leverage, unbeatable pace and scalability.
·thenewstack.io·
Why We're Sticking with Ruby on Rails at GitLab
ioctl() forever?
ioctl() forever?
In a combined storage and filesystem session at the 2022 Linux Storage, Filesystem, Memory-management and BPF Summit (LSFMM), Luis Chamberlain and James Bottomley led a discussion about the use of ioctl() as a mechanism for configuration. There are plenty of downsides to the use of ioctl() commands, and alternatives exist, but in general kernel developers have chosen to continue using this multiplexing system call. While there is interest in changing things, at least in some quarters, the discussion did not seem to indicate major changes on the horizon.
·lwn.net·
ioctl() forever?
SCIP - a better code indexing format than LSIF
SCIP - a better code indexing format than LSIF
We are excited to announce SCIP, a new indexing format that we are using at Sourcegraph to index programming languages to power code navigation features such as "Go to definition" and "Find references."
·about.sourcegraph.com·
SCIP - a better code indexing format than LSIF
Understanding UI Components in Elm - Humio
Understanding UI Components in Elm - Humio
This blog post highlights our key learnings from working in Elm over the years. Specifically, working with UI components — a common sticking point for new Elm developers.
·humio.com·
Understanding UI Components in Elm - Humio
API Platform - Reinventing API Security | Neosec
API Platform - Reinventing API Security | Neosec
Neosec API software is the intelligent way to protect your APIs from business abuse and data theft. Try our API Security platform now.
·neosec.com·
API Platform - Reinventing API Security | Neosec
Cyber Defense Matrix
Cyber Defense Matrix
The Cyber Defense Matrix is a framework created by Sounil Yu to help you expertly navigate the cybersecurity landscape.
·cyberdefensematrix.com·
Cyber Defense Matrix