System Architecture

System Architecture

7447 bookmarks
Custom sorting
Name–value pair - Wikipedia
Name–value pair - Wikipedia
A name–value pair, also called an attribute–value pair, key–value pair, or field–value pair, is a fundamental data representation in computing systems and applications. Designers often desire an open-ended data structure that allows for future extension without modifying existing code or data. In such situations, all or part of the data model may be expressed as a collection of 2-tuples in the form with each element being an attribute–value pair. Depending on the particular application and the implementation chosen by programmers, attribute names may or may not be unique.
·en.wikipedia.org·
Name–value pair - Wikipedia
Attribute–value system - Wikipedia
Attribute–value system - Wikipedia
An attribute–value system is a basic knowledge representation framework comprising a table with columns designating "attributes" (also known as "properties", "predicates", "features", "dimensions", "characteristics", "fields", "headers" or "independent variables" depending on the context) and "rows" designating "objects" (also known as "entities", "instances", "exemplars", "elements", "records" or "dependent variables"). Each table cell therefore designates the value (also known as "state") of a particular attribute of a particular object.
·en.wikipedia.org·
Attribute–value system - Wikipedia
HTML Links - Create Bookmark
HTML Links - Create Bookmark
W3Schools offers free online tutorials, references and exercises in all the major languages of the web. Covering popular subjects like HTML, CSS, JavaScript, Python, SQL, Java, and many, many more.
·w3schools.com·
HTML Links - Create Bookmark
Evolution of SoundCloud: Final Part
Evolution of SoundCloud: Final Part
Become a better full stack developer. A newsletter dedicated to web development and software architecture.
·fullstackexpress.io·
Evolution of SoundCloud: Final Part
Arista lays out AI networking plans
Arista lays out AI networking plans
Arista’s Etherlink technology will be supported across a range of products, including 800G systems and line cards, and will be compatible with specifications from the Ultra Ethernet Consortium.
·networkworld.com·
Arista lays out AI networking plans
Load Balancing: The power of micro-batching
Load Balancing: The power of micro-batching
It’s no secret I am a big fan of the “power of two random choices” algorithm (or more generally best-of-k) for resource based load…
·medium.com·
Load Balancing: The power of micro-batching
Stupid Git Tricks
Stupid Git Tricks
My apologies if you speak the Queen’s English since that title probably has a whole different meaning to you than I intended. In fact, I’m talking about Git, the version control system.…
·hackaday.com·
Stupid Git Tricks
Branch Out Your SQLite Database With LiteTree
Branch Out Your SQLite Database With LiteTree
Whether you want some quick and dirty data storage, or simply don’t have that heavy requirements for your local database system, SQLite is always a good choice. With its portable single-file …
·hackaday.com·
Branch Out Your SQLite Database With LiteTree
Linux Fu: Databases Are Next-Level File Systems | Hackaday
Linux Fu: Databases Are Next-Level File Systems | Hackaday
It is funny how exotic computer technology eventually either fails or becomes commonplace. At one time, having more than one user on a computer at once was high tech, for example. Then there are th…
·hackaday.com·
Linux Fu: Databases Are Next-Level File Systems | Hackaday
Building a RAG for tabular data in Go with PostgreSQL & Gemini
Building a RAG for tabular data in Go with PostgreSQL & Gemini
In this article we explore how to combine a large language model (LLM) with a relational database to allow users to ask questions about their data in a natural way. It demonstrates a Retrieval-Augmented Generation (RAG) system built with Go that utilizes PostgreSQL and pgvector for data storage and retrieval. The provided code showcases the core functionalities. This is an overview of how the
·pgaleone.eu·
Building a RAG for tabular data in Go with PostgreSQL & Gemini
Beyond Foreign Keys
Beyond Foreign Keys
In a relational database, foreign keys are normally used to associate records stored in different tables, but wouldn’t it be nice to define relationships dynamically without having to add extra columns or tables? And while we’re at it, how about having sparse relationships by associating a record directly with any other record like “post X was last edited by user #123” or “post X was flagged for review by user #456” (who happens to be a moderator)?
·lackofimagination.org·
Beyond Foreign Keys
Event Interception
Event Interception
Intercept any updates to system state and route some of them to a new component
·martinfowler.com·
Event Interception
USB HID And Run Exposes Yet Another BadUSB Surface
USB HID And Run Exposes Yet Another BadUSB Surface
You might think you understand the concept of BadUSB attacks and know how to defend it, because all you’ve seen is opening a terminal window. Turns out there’s still more attack surface…
·hackaday.com·
USB HID And Run Exposes Yet Another BadUSB Surface
Creating A Greener Edge
Creating A Greener Edge
Commissioned: The network edge is on its way to becoming the location where data is created faster than ever before, and where application innovation is
·nextplatform.com·
Creating A Greener Edge
Why WASI Preview 2 Makes WebAssembly Production Ready
Why WASI Preview 2 Makes WebAssembly Production Ready
Until recently, Wasm’s reality didn’t live up to the hype. Preview 2 is the missing link that Wasm needed to become viable for production use cases.
·thenewstack.io·
Why WASI Preview 2 Makes WebAssembly Production Ready
Anatomy of a credit card rewards program
Anatomy of a credit card rewards program
Credit card rewards are mostly funded out of interchange, a fee paid by businesses to accept cards.
·bitsaboutmoney.com·
Anatomy of a credit card rewards program
What are vector embeddings?
What are vector embeddings?
In machine learning and AI, vector embeddings are a way to represent complex data, such as words, sentences, or even images as points in a vector space, using vectors of real numbers.
·blog.meilisearch.com·
What are vector embeddings?
Unconventional uses of FPGAs
Unconventional uses of FPGAs
At the end of the day, the digital circuitry in an FPGA chip are analog circuits. When they are operating within their bounds, they properly behave like ideal digital circuits. Usually you want you…
·blog.adafruit.com·
Unconventional uses of FPGAs
A Long-Range Meshtastic Relay
A Long-Range Meshtastic Relay
In the past few years we’ve seen the rise of low-power mesh networking devices for everything from IoT devices, weather stations, and even off-grid communications networks. These radio module…
·hackaday.com·
A Long-Range Meshtastic Relay
A better keyboard than QWERTY
A better keyboard than QWERTY
On The Vergecast: bye-bye QWERTY, AI at Microsoft, and two thumbs up on Netflix.
·theverge.com·
A better keyboard than QWERTY