System Architecture

System Architecture

7404 bookmarks
Custom sorting
It’s Humans All the Way Down
It’s Humans All the Way Down
Writing about the big beautiful mess that is making things for the world wide web.
·blog.jim-nielsen.com·
It’s Humans All the Way Down
A tale of three architectures
A tale of three architectures
It’s been a couple years of working full-time on Luro and we’ve travelled through at least three (or four?) different distinct architectures. If that sounds like a lot, I’d agree. It’s been educational to say the least.
·daverupert.com·
A tale of three architectures
What is a reliable Data System?
What is a reliable Data System?
Learn the concepts of reliability, and how to define a reliable data system
·note.datengineer.dev·
What is a reliable Data System?
Planning vs Model Checking
Planning vs Model Checking
Comparing two software technologies you've probably never heard of
·buttondown.email·
Planning vs Model Checking
Planner programming blows my mind
Planner programming blows my mind
Picat is a research language intended to combine logic programming, imperative programming, and constraint solving. I originally learned it to help with vacation scheduling but soon discovered its planner module, which is one of the most fascinating programming models I’ve ever seen. First, a brief explanation of logic programming (LP). In imperative and functional programming, we take inputs and write algorithms that produce outputs. In LP and constraint solving, we instead provide a set of equations and find assignments that satisfy those relationships.
·hillelwayne.com·
Planner programming blows my mind
Strengthening Zero Trust strategy with SSE
Strengthening Zero Trust strategy with SSE
In today's rapidly evolving digital landscape, organizations face constant attacks from a multitude of sophisticated cyber threats and as traditional perimeter-based security models are becoming less effective against modern attacks, a paradigm shift towards a Zero Trust security strategy has gained significant momentum.
·networkworld.com·
Strengthening Zero Trust strategy with SSE
What is a vector database?
What is a vector database?
Vector databases are specialized systems to store, manage, and query data in the form of vector embeddings. They are optimized for similarity search, which involves finding the most similar items to a given query vector.
·blog.meilisearch.com·
What is a vector database?
Bloom Filters
Bloom Filters
A visual, interactive guide to what bloom filters are, when you would use them, and how they work.
·samwho.dev·
Bloom Filters
GraphRAG: A new approach for discovery using complex information
GraphRAG: A new approach for discovery using complex information
Microsoft is transforming retrieval-augmented generation with GraphRAG, using LLM-generated knowledge graphs to significantly improve Q&A when analyzing complex information and consistently outperforming baseline RAG. Get the details.
·microsoft.com·
GraphRAG: A new approach for discovery using complex information
Composable Architectures vs. Microservices: Which Is Best?
Composable Architectures vs. Microservices: Which Is Best?
Both software development architectures have pros and cons. Here’s how to decide whether a composable or microservices architecture will work best for you.
·thenewstack.io·
Composable Architectures vs. Microservices: Which Is Best?
Confidential Computing and Cloud Sovereignty in Europe
Confidential Computing and Cloud Sovereignty in Europe
Traditional security focuses on securing data at rest or in transit, while confidential computing ensures end-to-end protection, even during computation.
·thenewstack.io·
Confidential Computing and Cloud Sovereignty in Europe
Legion Programming System
Legion Programming System
Home page for the Legion parallel programming system
·legion.stanford.edu·
Legion Programming System
Interaction to Next Paint (INP) | Articles | web.dev
Interaction to Next Paint (INP) | Articles | web.dev
This post introduces the Interaction to Next Paint (INP) metric and explains how it works, how to measure it, and offers suggestions on how to improve it.
·web.dev·
Interaction to Next Paint (INP) | Articles | web.dev
OpenAI Injects Code Samples Into Their OpenAPI Using An Extension
OpenAI Injects Code Samples Into Their OpenAPI Using An Extension
As I was profiling the OpenAI API I noticed they had vendor extensions. This is a common thing I come across while profiling APIs, so I always make sure I spend some time evaluating the approach so that I can better understand why API producers feel the need to extend the spec. Twilio and Stripe both utilize extensions that help track maturity, PII, and other details of API operations that aren’t commonly expressed as OpenAPI. I harvested the OAS extensions from the OpenAI OpenAPI (I love using those two words together), and set them aside for documents here in my API Evangelist notebook.
·apievangelist.com·
OpenAI Injects Code Samples Into Their OpenAPI Using An Extension
Dev Tool Creator Nylas on the 4 Pillars of Modern APIs
Dev Tool Creator Nylas on the 4 Pillars of Modern APIs
Nylas issued its API version 3 on Feb. 6 with a revamped approach that builds in intelligence features and a better developer experience.
·thenewstack.io·
Dev Tool Creator Nylas on the 4 Pillars of Modern APIs
Open Payments
Open Payments
Open Payments is an open API standard for implementation by account servicing entities.
·openpayments.guide·
Open Payments
Web Monetization
Web Monetization
Web Monetization allows websites to automatically receive payments from users, facilitated by the user agent and a user's preferred monetization provider.
·webmonetization.org·
Web Monetization