System Architecture

System Architecture

7363 bookmarks
Custom sorting
Anatomy of a credit card rewards program
Anatomy of a credit card rewards program
Credit card rewards are mostly funded out of interchange, a fee paid by businesses to accept cards.
·bitsaboutmoney.com·
Anatomy of a credit card rewards program
What are vector embeddings?
What are vector embeddings?
In machine learning and AI, vector embeddings are a way to represent complex data, such as words, sentences, or even images as points in a vector space, using vectors of real numbers.
·blog.meilisearch.com·
What are vector embeddings?
Unconventional uses of FPGAs
Unconventional uses of FPGAs
At the end of the day, the digital circuitry in an FPGA chip are analog circuits. When they are operating within their bounds, they properly behave like ideal digital circuits. Usually you want you…
·blog.adafruit.com·
Unconventional uses of FPGAs
A Long-Range Meshtastic Relay
A Long-Range Meshtastic Relay
In the past few years we’ve seen the rise of low-power mesh networking devices for everything from IoT devices, weather stations, and even off-grid communications networks. These radio module…
·hackaday.com·
A Long-Range Meshtastic Relay
A better keyboard than QWERTY
A better keyboard than QWERTY
On The Vergecast: bye-bye QWERTY, AI at Microsoft, and two thumbs up on Netflix.
·theverge.com·
A better keyboard than QWERTY
API Design Is Pretty Bad — Here's How to Fix It
API Design Is Pretty Bad — Here's How to Fix It
Poorly made API design decisions, once in production, can cause pain and grief for businesses, customers and development teams for years.
·thenewstack.io·
API Design Is Pretty Bad — Here's How to Fix It
OSHW Framework Laptop Expansion Hides Dongles
OSHW Framework Laptop Expansion Hides Dongles
If you’ve got a wireless keyboard or mouse, you’ve probably got a receiver dongle of some sort tucked away in one of your machine’s USB ports. While modern technology has allowed …
·hackaday.com·
OSHW Framework Laptop Expansion Hides Dongles
Identity, authentication, and authorisation from the ground up
Identity, authentication, and authorisation from the ground up
In this post we will dive deeper and demystify how apps actually implement authentication. Do it right, and you barely notice it. But do it wrong, and you lock users out or open major security holes.
·technicallythinking.substack.com·
Identity, authentication, and authorisation from the ground up
RAFT: A new way to teach LLMs to be better at RAG
RAFT: A new way to teach LLMs to be better at RAG
In this article, we will look at the limitations of RAG and domain-specific Fine-tuning to adapt LLMs to existing knowledge and how a team of UC Berkeley..
·techcommunity.microsoft.com·
RAFT: A new way to teach LLMs to be better at RAG
RAFT
RAFT
·gorilla.cs.berkeley.edu·
RAFT
Why x86 Doesn’t Need to Die
Why x86 Doesn’t Need to Die
Hackaday recently published an article titled “Why x86 Needs to Die” – the latest addition in a long-running RISC vs CISC debate. Rather than x86 needing to die, I believe the RISC vs C…
·chipsandcheese.com·
Why x86 Doesn’t Need to Die
Better Load Balancing: Real-Time Dynamic Subsetting
Better Load Balancing: Real-Time Dynamic Subsetting
Subsetting is a common technique used in load balancing for large-scale distributed systems. In this blog post, we will briefly introduce current Uber’s service mesh architecture that has been powering thousands of critical microservices in Uber since 2016. We will then discuss the challenges we faced when trying to scale the number of tasks in the mesh and issues with our initial subsetting approach. We’ll finish with how we came up with the real-time dynamic subsetting solution and its results in production.
·uber.com·
Better Load Balancing: Real-Time Dynamic Subsetting
Dogma Metalanguage
Dogma Metalanguage
A human-friendly metalanguage for describing data formats in documentation using the familiar patterns of Backus-Naur Form
·dogma-lang.org·
Dogma Metalanguage
Hubris
Hubris
·hubris.oxide.computer·
Hubris
EdgeConnect SD-WAN with SWG: building a SASE foundation
EdgeConnect SD-WAN with SWG: building a SASE foundation
In this blog, we’ll explore the benefits of integrating SWG into a secure SD-WAN for a unified, efficient, and comprehensive approach to network security.
·networkworld.com·
EdgeConnect SD-WAN with SWG: building a SASE foundation
Moving API Docs From Human-Readable to Machine-Readable
Moving API Docs From Human-Readable to Machine-Readable
One of the super powers of APIs.json is the ability to evolve the human-readable aspects of API operations into machine-readable ones–as this is how we are going to scale to deliver the API economy all of us API believers envision in our minds eye. I saw what Swagger (now OpenAPI) had done for API documentation back in 2013, and I wanted this for the other essential building blocks of our API operations. A decade later I am still translating our getting started, plans, SDKs, road map, change log, and support into machine-readable artifacts as part of our API Commons work, but I am still working to translate documentation into machine-readable artifacts as well.
·apievangelist.com·
Moving API Docs From Human-Readable to Machine-Readable