System Architecture

System Architecture

7447 bookmarks
Custom sorting
AMD issues fixes for processor vulnerabilities
AMD issues fixes for processor vulnerabilities
Researchers disclosed multiple potential vulnerabilities that may impact some AMD processors, including Zen-based product lines across multiple generations.
·networkworld.com·
AMD issues fixes for processor vulnerabilities
Safer Image Builds with Cloud Native Buildpacks and Wolfi
Safer Image Builds with Cloud Native Buildpacks and Wolfi
This post discusses how to create containers that are smaller and more secure by including Wolfi as the base image when creating containers using Cloud Native Buildpacks.
·thenewstack.io·
Safer Image Builds with Cloud Native Buildpacks and Wolfi
TsFile: A Standard Format for IoT Time Series Data
TsFile: A Standard Format for IoT Time Series Data
The columnar storage file format is designed for IoT’s unique needs, including reduced network transmission and cloud computing resources.
·thenewstack.io·
TsFile: A Standard Format for IoT Time Series Data
Demystifying Message Brokers: Part 2 - RabbitMQ
Demystifying Message Brokers: Part 2 - RabbitMQ
In the previous part we've talked about message brokers in general and I hope you got a brief understanding of how they work and why you'd need them. In this article, we're going to dive deeper and explore one of them - **RabbitMQ**.
·anakidze.dev·
Demystifying Message Brokers: Part 2 - RabbitMQ
Inside Minority Report's 'Idea Summit,' Visionaries Saw the Future
Inside Minority Report's 'Idea Summit,' Visionaries Saw the Future
Three years before making Minority Report, director Steven Spielberg assembled a supergroup of deep thinkers who conceptualized many of the movie's most enduring visions of the future. A virtual roundtable takes you back to that momentous event in the history of sci-fi filmmaking.
·wired.com·
Inside Minority Report's 'Idea Summit,' Visionaries Saw the Future
It’s Humans All the Way Down
It’s Humans All the Way Down
Writing about the big beautiful mess that is making things for the world wide web.
·blog.jim-nielsen.com·
It’s Humans All the Way Down
A tale of three architectures
A tale of three architectures
It’s been a couple years of working full-time on Luro and we’ve travelled through at least three (or four?) different distinct architectures. If that sounds like a lot, I’d agree. It’s been educational to say the least.
·daverupert.com·
A tale of three architectures
What is a reliable Data System?
What is a reliable Data System?
Learn the concepts of reliability, and how to define a reliable data system
·note.datengineer.dev·
What is a reliable Data System?
Planning vs Model Checking
Planning vs Model Checking
Comparing two software technologies you've probably never heard of
·buttondown.email·
Planning vs Model Checking
Planner programming blows my mind
Planner programming blows my mind
Picat is a research language intended to combine logic programming, imperative programming, and constraint solving. I originally learned it to help with vacation scheduling but soon discovered its planner module, which is one of the most fascinating programming models I’ve ever seen. First, a brief explanation of logic programming (LP). In imperative and functional programming, we take inputs and write algorithms that produce outputs. In LP and constraint solving, we instead provide a set of equations and find assignments that satisfy those relationships.
·hillelwayne.com·
Planner programming blows my mind
Strengthening Zero Trust strategy with SSE
Strengthening Zero Trust strategy with SSE
In today's rapidly evolving digital landscape, organizations face constant attacks from a multitude of sophisticated cyber threats and as traditional perimeter-based security models are becoming less effective against modern attacks, a paradigm shift towards a Zero Trust security strategy has gained significant momentum.
·networkworld.com·
Strengthening Zero Trust strategy with SSE
What is a vector database?
What is a vector database?
Vector databases are specialized systems to store, manage, and query data in the form of vector embeddings. They are optimized for similarity search, which involves finding the most similar items to a given query vector.
·blog.meilisearch.com·
What is a vector database?
Bloom Filters
Bloom Filters
A visual, interactive guide to what bloom filters are, when you would use them, and how they work.
·samwho.dev·
Bloom Filters
GraphRAG: A new approach for discovery using complex information
GraphRAG: A new approach for discovery using complex information
Microsoft is transforming retrieval-augmented generation with GraphRAG, using LLM-generated knowledge graphs to significantly improve Q&A when analyzing complex information and consistently outperforming baseline RAG. Get the details.
·microsoft.com·
GraphRAG: A new approach for discovery using complex information
Composable Architectures vs. Microservices: Which Is Best?
Composable Architectures vs. Microservices: Which Is Best?
Both software development architectures have pros and cons. Here’s how to decide whether a composable or microservices architecture will work best for you.
·thenewstack.io·
Composable Architectures vs. Microservices: Which Is Best?