Common Mistakes in Modularisation
System Architecture
Demystifying Message Brokers: Part 2 - RabbitMQ
In the previous part we've talked about message brokers in general and I hope you got a brief understanding of how they work and why you'd need them. In this article, we're going to dive deeper and explore one of them - **RabbitMQ**.
Inside Minority Report's 'Idea Summit,' Visionaries Saw the Future
Three years before making Minority Report, director Steven Spielberg assembled a supergroup of deep thinkers who conceptualized many of the movie's most enduring visions of the future. A virtual roundtable takes you back to that momentous event in the history of sci-fi filmmaking.
'Minority Report' started with a 2054 'think tank summit' - watch it now on Peacock!
Part of the genius of Steven Spielberg’s Minority Report is the way the movie hides its dystopia beneath the comforting skin of the familiar.
Technologies in Minority Report - Wikipedia
It’s Humans All the Way Down
Writing about the big beautiful mess that is making things for the world wide web.
A tale of three architectures
It’s been a couple years of working full-time on Luro and we’ve travelled through at least three (or four?) different distinct architectures. If that sounds like a lot, I’d agree. It’s been educational to say the least.
Managing Java Applications Running in Docker Containers Using JMX
Efficient Monitoring and Management Solutions for Container Environments
What is a reliable Data System?
Learn the concepts of reliability, and how to define a reliable data system
Planning vs Model Checking
Comparing two software technologies you've probably never heard of
Planner programming blows my mind
Picat is a research language intended to combine logic programming, imperative programming, and constraint solving. I originally learned it to help with vacation scheduling but soon discovered its planner module, which is one of the most fascinating programming models I’ve ever seen.
First, a brief explanation of logic programming (LP). In imperative and functional programming, we take inputs and write algorithms that produce outputs. In LP and constraint solving, we instead provide a set of equations and find assignments that satisfy those relationships.
Writing a scheduler for Linux in Rust that runs in user-space
Overview I’ve decided to start a series of blog posts to cover some details about scx_rustland , my little Linux scheduler written in Rust ...
Strengthening Zero Trust strategy with SSE
In today's rapidly evolving digital landscape, organizations face constant attacks from a multitude of sophisticated cyber threats and as traditional perimeter-based security models are becoming less effective against modern attacks, a paradigm shift towards a Zero Trust security strategy has gained significant momentum.
Never* use Datagrams - Media over QUIC
Media over QUIC is a new live media protocol in development by the IETF.
What is a vector database?
Vector databases are specialized systems to store, manage, and query data in the form of vector embeddings. They are optimized for similarity search, which involves finding the most similar items to a given query vector.
What if S3 could be a fast, globally synced, Key Value Database? That's Tigris
Documentation and guides from the team at Fly.io.
Bloom Filters
A visual, interactive guide to what bloom filters are, when you would use them, and how they work.
Goblins: Distributed Programming -- Spritely Institute
How Reddit Scaled to Millions of Decisions Per Second | Permit
Scale is a challenge that every developer encounters at some point - how did Reddit approach this challenge, and what can we learn from it?
GraphRAG: A new approach for discovery using complex information
Microsoft is transforming retrieval-augmented generation with GraphRAG, using LLM-generated knowledge graphs to significantly improve Q&A when analyzing complex information and consistently outperforming baseline RAG. Get the details.
Edan Schwartz- Web Developer
Composable Architectures vs. Microservices: Which Is Best?
Both software development architectures have pros and cons. Here’s how to decide whether a composable or microservices architecture will work best for you.
Confidential Computing and Cloud Sovereignty in Europe
Traditional security focuses on securing data at rest or in transit, while confidential computing ensures end-to-end protection, even during computation.
Legion Programming System
Home page for the Legion parallel programming system
Astro Creator: New Web Metric Will Hurt JS Framework Sites
The creator of Astro has raised questions about whether a new Web Core Vital will hurt sites using two popular JavaScript frameworks.
Introducing INP to Core Web Vitals | Google Search Central Blog | Google for Developers
Interaction to Next Paint (INP) | Articles | web.dev
This post introduces the Interaction to Next Paint (INP) metric and explains how it works, how to measure it, and offers suggestions on how to improve it.
Huffman Codes – How Do They Work?
OpenAI Injects Code Samples Into Their OpenAPI Using An Extension
As I was profiling the OpenAI API I noticed they had vendor extensions. This is a common thing I come across while profiling APIs, so I always make sure I spend some time evaluating the approach so that I can better understand why API producers feel the need to extend the spec. Twilio and Stripe both utilize extensions that help track maturity, PII, and other details of API operations that aren’t commonly expressed as OpenAPI. I harvested the OAS extensions from the OpenAI OpenAPI (I love using those two words together), and set them aside for documents here in my API Evangelist notebook.
Chromium devs plan to put micropayments in the browser
I'd buy that for a $0.00000001