System Architecture

System Architecture

7622 bookmarks
Custom sorting
Planner programming blows my mind
Planner programming blows my mind
Picat is a research language intended to combine logic programming, imperative programming, and constraint solving. I originally learned it to help with vacation scheduling but soon discovered its planner module, which is one of the most fascinating programming models I’ve ever seen. First, a brief explanation of logic programming (LP). In imperative and functional programming, we take inputs and write algorithms that produce outputs. In LP and constraint solving, we instead provide a set of equations and find assignments that satisfy those relationships.
·hillelwayne.com·
Planner programming blows my mind
Strengthening Zero Trust strategy with SSE
Strengthening Zero Trust strategy with SSE
In today's rapidly evolving digital landscape, organizations face constant attacks from a multitude of sophisticated cyber threats and as traditional perimeter-based security models are becoming less effective against modern attacks, a paradigm shift towards a Zero Trust security strategy has gained significant momentum.
·networkworld.com·
Strengthening Zero Trust strategy with SSE
What is a vector database?
What is a vector database?
Vector databases are specialized systems to store, manage, and query data in the form of vector embeddings. They are optimized for similarity search, which involves finding the most similar items to a given query vector.
·blog.meilisearch.com·
What is a vector database?
Bloom Filters
Bloom Filters
A visual, interactive guide to what bloom filters are, when you would use them, and how they work.
·samwho.dev·
Bloom Filters
Composable Architectures vs. Microservices: Which Is Best?
Composable Architectures vs. Microservices: Which Is Best?
Both software development architectures have pros and cons. Here’s how to decide whether a composable or microservices architecture will work best for you.
·thenewstack.io·
Composable Architectures vs. Microservices: Which Is Best?
Confidential Computing and Cloud Sovereignty in Europe
Confidential Computing and Cloud Sovereignty in Europe
Traditional security focuses on securing data at rest or in transit, while confidential computing ensures end-to-end protection, even during computation.
·thenewstack.io·
Confidential Computing and Cloud Sovereignty in Europe
Legion Programming System
Legion Programming System
Home page for the Legion parallel programming system
·legion.stanford.edu·
Legion Programming System
Interaction to Next Paint (INP) | Articles | web.dev
Interaction to Next Paint (INP) | Articles | web.dev
This post introduces the Interaction to Next Paint (INP) metric and explains how it works, how to measure it, and offers suggestions on how to improve it.
·web.dev·
Interaction to Next Paint (INP) | Articles | web.dev
OpenAI Injects Code Samples Into Their OpenAPI Using An Extension
OpenAI Injects Code Samples Into Their OpenAPI Using An Extension
As I was profiling the OpenAI API I noticed they had vendor extensions. This is a common thing I come across while profiling APIs, so I always make sure I spend some time evaluating the approach so that I can better understand why API producers feel the need to extend the spec. Twilio and Stripe both utilize extensions that help track maturity, PII, and other details of API operations that aren’t commonly expressed as OpenAPI. I harvested the OAS extensions from the OpenAI OpenAPI (I love using those two words together), and set them aside for documents here in my API Evangelist notebook.
·apievangelist.com·
OpenAI Injects Code Samples Into Their OpenAPI Using An Extension
Dev Tool Creator Nylas on the 4 Pillars of Modern APIs
Dev Tool Creator Nylas on the 4 Pillars of Modern APIs
Nylas issued its API version 3 on Feb. 6 with a revamped approach that builds in intelligence features and a better developer experience.
·thenewstack.io·
Dev Tool Creator Nylas on the 4 Pillars of Modern APIs
Open Payments
Open Payments
Open Payments is an open API standard for implementation by account servicing entities.
·openpayments.guide·
Open Payments
Web Monetization
Web Monetization
Web Monetization allows websites to automatically receive payments from users, facilitated by the user agent and a user's preferred monetization provider.
·webmonetization.org·
Web Monetization
Distributed Logical Time
Distributed Logical Time
A simple, decentralized, scalable, constant-memory mechanism for independent replicas to record events in time, preserving the "happened-before" relation in almost all cases.
·longform.asmartbear.com·
Distributed Logical Time
The architecture of SAST tools: An explainer for developers
The architecture of SAST tools: An explainer for developers
More developers will have to fix security issues in the age of shifting left. Here, we break down how SAST tools can help them find and address vulnerabilities.
·github.blog·
The architecture of SAST tools: An explainer for developers