System Architecture

System Architecture

7447 bookmarks
Custom sorting
Reading the Generalized Isolation Level Definitions paper with Alloy
Reading the Generalized Isolation Level Definitions paper with Alloy
My last few blog posts have been about how I used TLA+ to gain a better understanding of database transaction consistency models. This post will be in the same spirit, but I’ll be using a dif…
·surfingcomplexity.blog·
Reading the Generalized Isolation Level Definitions paper with Alloy
System Design Part 1: Setup a Simple Load Balancer using Python - Conrad's Blog - Insights on Technology Leadership and Software Engineering
System Design Part 1: Setup a Simple Load Balancer using Python - Conrad's Blog - Insights on Technology Leadership and Software Engineering
Unlock the fundamentals of system design with our guide to building a load balancer. Learn how load balancing distributes traffic, optimizes resources, and enhances application reliability by providing redundancy and handling high traffic efficiently
·conradlotz.com·
System Design Part 1: Setup a Simple Load Balancer using Python - Conrad's Blog - Insights on Technology Leadership and Software Engineering
How some of the world's most brilliant computer scientists got password policies so wrong
How some of the world's most brilliant computer scientists got password policies so wrong
The US government’s latest recommendations acknowledge that password composition and reset rules are not just annoying, but counterproductive. The story of why password rules were recommended and enforced without scientific evidence since their invention in 1979 is a story of brilliant people, at the very top of their field, whose well-intentioned recommendations led to decades of ignorance. These mistakes are worth studying, in part, because the people making them were so damn brilliant and the consequences were so long lasting.
·stuartschechter.org·
How some of the world's most brilliant computer scientists got password policies so wrong
Fruits & Roots
Fruits & Roots
The forest offers much but demands much too
·tidyfirst.substack.com·
Fruits & Roots
Design discussion - Ecto is your application - Chat / Discussions - Elixir Programming Language Forum
Design discussion - Ecto is your application - Chat / Discussions - Elixir Programming Language Forum
Hello, everyone! This should probably be a blog post, but I don’t have a blog, so here we go 😄 My thoughts and frustrations regarding domain modeling in the face of persistence, distilled into a few paragraphs. I’m interested in your opinions. This is probably going to get a bit philosophical, but hopefully also stay practical. I’d like to talk about the age old problem of ORMs. And when it comes to the impedance mismatch problem, Ecto is in the exact same situation as any other ORM in ot...
·elixirforum.com·
Design discussion - Ecto is your application - Chat / Discussions - Elixir Programming Language Forum
Revisiting the Outbox Pattern
Revisiting the Outbox Pattern
Comparing the outbox pattern to alternatives like “listen-to-yourself” and 2-phase commit (2PC) transactions. What’s the best choice for data exchange flows between microservices?
·decodable.co·
Revisiting the Outbox Pattern
WebVM 2.0: A complete Linux Desktop Environment in the browser via WebAssembly
WebVM 2.0: A complete Linux Desktop Environment in the browser via WebAssembly
WebVM is a full Linux environment running in the browser, client-side. It is a complete virtual machine, with support for persistent data storage, networking and, as of today’s release, Xorg and complete desktop environments. This article will explain the WebVM architecture, how the main components work, and what you can build with this technology.
·labs.leaningtech.com·
WebVM 2.0: A complete Linux Desktop Environment in the browser via WebAssembly
Nomadic Infrastructure Design for AI Workloads | Tigris Object Storage
Nomadic Infrastructure Design for AI Workloads | Tigris Object Storage
This AI stuff is cool, but GPU inference is not needed all of the time. Most of the time your instances stay idle, which means you're just burning investor money without any real benefit. Today we'll learn how to make your compute spread between hosts nomadically, hunting deals and using Tigris to make it all possible.
·tigrisdata.com·
Nomadic Infrastructure Design for AI Workloads | Tigris Object Storage
Message Queues in System Design
Message Queues in System Design
Learn the basics of message queues and how they enhance system design for modern software development.
·levelup.gitconnected.com·
Message Queues in System Design
The Key Fundamentals of Programming You Should Know
The Key Fundamentals of Programming You Should Know
Before diving into any specific programming language, aspiring developers should master these essential concepts that form the foundation of all software development.
·thenewstack.io·
The Key Fundamentals of Programming You Should Know
The Back End AI Network Puts Pressure On The Front End
The Back End AI Network Puts Pressure On The Front End
For most of the history of high performance computing, a supercomputer was a freestanding, isolated machine that was designed to run some simulation or
·nextplatform.com·
The Back End AI Network Puts Pressure On The Front End
A conceptual model of ATProto and ActivityPub
A conceptual model of ATProto and ActivityPub
If you were to design an open social networking protocol, what would that look like? Which metaphors and comparisons would you use to get a general idea of how the network functions? And what would you answer if people ask if your network is decentralised and federated?
·fediversereport.com·
A conceptual model of ATProto and ActivityPub
Bento
Bento
Insights into performance-related data made accessible.
·benbeben.vercel.app·
Bento
Squishy Software Series: "Hackable" Email - Extending Postfix with Wasm
Squishy Software Series: "Hackable" Email - Extending Postfix with Wasm
Vacation auto-responders got you feeling down? Try something a bit more imaginative and take email system customization to the max! See how the best of old-school sysadmin meets bleeding edge extensibility technology.
·getxtp.com·
Squishy Software Series: "Hackable" Email - Extending Postfix with Wasm
Using systems modeling to refine strategy.
Using systems modeling to refine strategy.
While I was probably late to learn the concept of strategy testing, I might have learned about systems modeling too early in my career, stumbling on Donella Meadows’ Thinking in Systems: A Primer before I began my career in software. Over the years, I’ve discovered a number of ways to miuse systems modeling, but it remains the most effective, flexible tool I’ve found to debugging complex problems. In this chapter, we’ll work through:
·lethain.com·
Using systems modeling to refine strategy.
Ubiquitous Successful Bus: Hacking USB 2 Hubs
Ubiquitous Successful Bus: Hacking USB 2 Hubs
USB 2 hubs are, by now, omnipresent. it doesn’t cost much to add to your board, and you truly have tons of options. The standard option is 4-port hubs – one uplink port to your host, fo…
·hackaday.com·
Ubiquitous Successful Bus: Hacking USB 2 Hubs
M.2 Makes An Unusual Microcontroller Form Factor
M.2 Makes An Unusual Microcontroller Form Factor
When we think of an m.2 slot in our laptop or similar, it’s usually in the context of its PCI connectivity for high-speed applications such as solid state disks. It’s a connector that o…
·hackaday.com·
M.2 Makes An Unusual Microcontroller Form Factor
Constraints on Software Design
Constraints on Software Design
I’m liking my new talk about Empirical Software Design.
·tidyfirst.substack.com·
Constraints on Software Design