System Architecture

System Architecture

7619 bookmarks
Custom sorting
The architecture behind 99.9999% uptime in erlang
The architecture behind 99.9999% uptime in erlang
Have you ever wondered how to build the most stable application in the world? What characteristics does such an application have, and what architecture styles make it possible?
·volodymyrpotiichuk.com·
The architecture behind 99.9999% uptime in erlang
API Versioning - A Deep Dive
API Versioning - A Deep Dive
#92: Understanding API Versioning Strategies (14 Minutes)
·newsletter.systemdesign.one·
API Versioning - A Deep Dive
Network Virtualization & Overlay Protocols Explained
Network Virtualization & Overlay Protocols Explained
Explore VXLAN, GRE, NVGRE, and GENEVE in this expert guide to network virtualization and overlay protocols for scalable, secure cloud networking.
·networkdevicesinc.com·
Network Virtualization & Overlay Protocols Explained
CodeQL zero to hero part 1: The fundamentals of static analysis for vulnerability research
CodeQL zero to hero part 1: The fundamentals of static analysis for vulnerability research
Learn more about static analysis and how to use it for security research!In this blog post series, we will take a closer look at static analysis concepts, present GitHub’s static analysis tool CodeQL, and teach you how to leverage static analysis for security research by writing custom CodeQL queries.
·github.blog·
CodeQL zero to hero part 1: The fundamentals of static analysis for vulnerability research
Coreboot and Linux Hardware: Inside Star Labs with Sean Rhodes
Coreboot and Linux Hardware: Inside Star Labs with Sean Rhodes
Sean Rhodes, Firmware Engineer at Star Labs, shares the journey of building Linux-first laptops and mini PCs backed by open firmware. From the early days as a side project to surviving supply chain crises and choosing coreboot over AMI BIOS, Sean explains what it takes to create reliable hardware for the open source community.
·vpetersson.com·
Coreboot and Linux Hardware: Inside Star Labs with Sean Rhodes
How Kafka Works
How Kafka Works
#91: Learn Everything About Apache Kafka’s Architecture, Including Brokers, KRaft, Topic Partitions, Tiered Storage, Exactly Once, Kafka Connect, Kafka Schema Registry and Kafka Streams
·newsletter.systemdesign.one·
How Kafka Works
Third eBPF Workshop
Third eBPF Workshop
This post presents the material (papers and presentation slides) from the third edition of the eBPF workshop at ACM SIGCOMM 2025.
·pchaigno.github.io·
Third eBPF Workshop
Cost of a data breach 2025 | IBM
Cost of a data breach 2025 | IBM
IBM’s global Cost of a Data Breach Report 2025 provides up-to-date insights into cybersecurity threats and their financial impacts on organizations.
·ibm.com·
Cost of a data breach 2025 | IBM
What is Cost of Complexity? - And How to Calculate it
What is Cost of Complexity? - And How to Calculate it
Cost of Complexity is key to enable Balanced Decisions regarding your Product Architecture. Download an Excel Template to help you with your Analysis!
·modularmanagement.com·
What is Cost of Complexity? - And How to Calculate it
The multi-million dollar price of complexity
The multi-million dollar price of complexity
Complex IT complexity costs enterprises millions, draining resources and stifling innovation. A modern, API-driven approach can cut costs and drive agility.
·indykite.com·
The multi-million dollar price of complexity
Identity Types
Identity Types
Previously: Models of (Dependent) Type Theory. There is a deep connection between mathematics and programming. Computer programs deal with such mathematical objects as numbers, vectors, monoids, fu…
·bartoszmilewski.com·
Identity Types
Knotty
Knotty
·t0mpr1c3.github.io·
Knotty
Cap'n Web: A new RPC system for browsers and web servers
Cap'n Web: A new RPC system for browsers and web servers
Cap'n Web is a new open source, JavaScript-native RPC protocol for use in browsers and web servers. It provides the expressive power of Cap'n Proto, but with no schemas and no boilerplate.
·blog.cloudflare.com·
Cap'n Web: A new RPC system for browsers and web servers
A Tour of eBPF in the Linux Kernel: Observability, Security and Networking | Blog
A Tour of eBPF in the Linux Kernel: Observability, Security and Networking | Blog
eBPF lets you run small, verified programs inside the Linux kernel, enabling fast observability, security, and networking without changing application code. This practical tour explains why eBPF matters now, how programs are compiled, verified, JITed, and attached to events, and how maps and ring buffers move data. You'll leave with simple demos and a clear mental model to start experimenting.
·lucavall.in·
A Tour of eBPF in the Linux Kernel: Observability, Security and Networking | Blog
Agentic feature flags | Reflag
Agentic feature flags | Reflag
As coding agents mature and developer adoption accelerates, organizations can produce code faster than ever. But with speed and agent-written code comes risk and merge conflicts. To unlock shipping fast – and safely – mitigating these issues is essential. Here's how agent-ready feature flags make this possible.
·reflag.com·
Agentic feature flags | Reflag