System Architecture

System Architecture

7614 bookmarks
Custom sorting
How to Design a Decentralized Social Media Protocol - Project Liberty
How to Design a Decentralized Social Media Protocol - Project Liberty
Project Liberty sat down with Dave Clark, an early contributor to the TCP/IP protocols that built and run the internet, and one of the expert advisors on DSNP, the Decentralized Social Networking Protocol.
·projectliberty.io·
How to Design a Decentralized Social Media Protocol - Project Liberty
LibertyDSNP repositories
LibertyDSNP repositories
Project Liberty Institute has 36 repositories available. Follow their code on GitHub.
·github.com·
LibertyDSNP repositories
DSNP - DSNP Overview
DSNP - DSNP Overview
DSNP establishes a shared social layer no longer dependent on a specific app or centralized platform.
·dsnp.org·
DSNP - DSNP Overview
Time and Space Complexity
Time and Space Complexity
Understanding time complexity and space complexity is fundamental to writing efficient, scalable code. This guide explores Big-O notation and common complexity patterns through practical examples and real-world analogies.
·itsgg.com·
Time and Space Complexity
Data evolution with set-theoretic types - Dashbit Blog
Data evolution with set-theoretic types - Dashbit Blog
We explore how set-theoretic types could address how many statically typed languages do not allow libraries to evolve their public data definitions in a backwards compatible manner. The proposed solution aims to be automatically verified by the compiler and type safe.
·dashbit.co·
Data evolution with set-theoretic types - Dashbit Blog
The Seven-Action Documentation model
The Seven-Action Documentation model
I think all technical writers, at some point or another, feel the urge to base their work on something more systematic than “it’s just the way folks documented stuff since forever”. Toolkits and frameworks provide content types, which is immensely valuable when you know what you want to write, but starting from there is like buying a hammer without knowing that half of the work you’ll do is turning screws. As I find the lack of deeper conversation around this topic rather unsettling, I decided to contribute some verses.
·passo.uno·
The Seven-Action Documentation model
How Do AirTags Work
How Do AirTags Work
#64: A Simple Introduction to AirTags Architecture (3 Minutes)
·newsletter.systemdesign.one·
How Do AirTags Work
Analysis of Political Sentiment Orientations on Twitter
Analysis of Political Sentiment Orientations on Twitter
The dramatic increase in the number of users on social media platform leads to the generation of huge amount of unstructured text in the form of messa…
·sciencedirect.com·
Analysis of Political Sentiment Orientations on Twitter
Political Sentiment Analysis: How can we use Sentiment Analysis to Predict Political Outcomes
Political Sentiment Analysis: How can we use Sentiment Analysis to Predict Political Outcomes
Political sentiment analysis uses natural language processing and computational linguistics to identify subjective feelings about a topic in written or spoken language. Natural Language Processing (NLP) involves textual data mining to identify linguistic patterns that reveal an emotional state, affective state, cognitive state, attitudes toward something or someone, personality traits, and other psychological constructs. These analyses can
·politicalmarketer.com·
Political Sentiment Analysis: How can we use Sentiment Analysis to Predict Political Outcomes
NLTK Sentiment Analysis Tutorial For Beginners - GeeksforGeeks
NLTK Sentiment Analysis Tutorial For Beginners - GeeksforGeeks
A Computer Science portal for geeks. It contains well written, well thought and well explained computer science and programming articles, quizzes and practice/competitive programming/company interview Questions.
·geeksforgeeks.org·
NLTK Sentiment Analysis Tutorial For Beginners - GeeksforGeeks
Audio Video Interleave - Wikipedia
Audio Video Interleave - Wikipedia
Audio Video Interleave (also Audio Video Interleaved and known by its initials and filename extension AVI, usually pronounced /ˌeɪ.viːˈaɪ/[3]) is a proprietary multimedia container format and Windows standard[4] introduced by Microsoft in November 1992 as part of its Video for Windows software. AVI files can contain both audio and video data in a file container that allows synchronous audio-with-video playback. Like the DVD video format, AVI files support multiple streaming audio and video, although these features are seldom used.
·en.wikipedia.org·
Audio Video Interleave - Wikipedia
Matroska - Wikipedia
Matroska - Wikipedia
Matroska (styled Matroška) is a project to create a container format that can hold an unlimited number of video, audio, picture, or subtitle tracks in one file.[4] The Matroska Multimedia Container is similar in concept to other containers like AVI, MP4, or Advanced Systems Format (ASF), but is an open standard.
·en.wikipedia.org·
Matroska - Wikipedia
Resource Interchange File Format - Wikipedia
Resource Interchange File Format - Wikipedia
Resource Interchange File Format (RIFF) is a generic file container format for storing data in tagged chunks.[2] It is primarily used for audio and video, though it can be used for arbitrary data.[3]
·en.wikipedia.org·
Resource Interchange File Format - Wikipedia
Interchange File Format - Wikipedia
Interchange File Format - Wikipedia
Interchange File Format (IFF) is a generic digital container file format originally introduced by Electronic Arts (in cooperation with Commodore) in 1985 to facilitate transfer of data between software produced by different companies.
·en.wikipedia.org·
Interchange File Format - Wikipedia
TIFF - Wikipedia
TIFF - Wikipedia
Tag Image File Format[1] or Tagged Image File Format,[2] commonly known by the abbreviations TIFF or TIF, is an image file format for storing raster graphics images, popular among graphic artists, the publishing industry,[3] and photographers. TIFF is widely supported by scanning, faxing, word processing, optical character recognition, image manipulation, desktop publishing, and page-layout applications.[4] The format was created by the Aldus Corporation for use in desktop publishing. It published the latest version 6.0 in 1992, subsequently updated with an Adobe Systems copyright after the latter acquired Aldus in 1994. Several Aldus or Adobe technical notes have been published with minor extensions to the format, and several specifications have been based on TIFF 6.0, including TIFF/EP (ISO 12234-2), TIFF/IT (ISO 12639),[5][6][7] TIFF-F (RFC 2306) and TIFF-FX (RFC 3949).[8]
·en.wikipedia.org·
TIFF - Wikipedia
Decentralized Identifiers (DIDs) v1.0
Decentralized Identifiers (DIDs) v1.0
Decentralized identifiers (DIDs) are a new type of identifier that enables verifiable, decentralized digital identity. A DID refers to any subject (e.g., a person, organization, thing, data model, abstract entity, etc.) as determined by the controller of the DID. In contrast to typical, federated identifiers, DIDs have been designed so that they may be decoupled from centralized registries, identity providers, and certificate authorities. Specifically, while other parties might be used to help enable the discovery of information related to a DID, the design enables the controller of a DID to prove control over it without requiring permission from any other party. DIDs are URIs that associate a DID subject with a DID document allowing trustable interactions associated with that subject.
·w3.org·
Decentralized Identifiers (DIDs) v1.0
Home automation - Wikipedia
Home automation - Wikipedia
Home automation or domotics is building automation for a home. A home automation system will monitor and/or control home attributes such as lighting, climate, entertainment systems, and appliances. It may also include home security such as access control and alarm systems.
·en.wikipedia.org·
Home automation - Wikipedia
FidoNet - Wikipedia
FidoNet - Wikipedia
FidoNet is a worldwide computer network that is used for communication between bulletin board systems (BBSes). It uses a store-and-forward system to exchange private (email) and public (forum) messages between the BBSes in the network, as well as other files and protocols in some cases.
·en.m.wikipedia.org·
FidoNet - Wikipedia
Lotus 1-2-3 - Wikipedia
Lotus 1-2-3 - Wikipedia
Lotus 1-2-3 is a discontinued spreadsheet program from Lotus Software. It was the first killer application of the IBM PC, was hugely popular in the 1980s, and significantly contributed to the success of IBM PC-compatibles in the business market.
·en.wikipedia.org·
Lotus 1-2-3 - Wikipedia