liberal - Wiktionary, the free dictionary

System Architecture
Digital object identifier - Wikipedia
Handle System - Wikipedia
Gorget patches - Wikipedia
Brief reminder:
Functional requirements = what the system should do
Cross-compatibility of IPFS and BitTorrent with WebSeeding
IMO this is very doable whether Kubo can do this very efficiently or whether it’d be more efficient to leverage existing IPFS library code (e.g. the Go code that goes into Kubo or some of the alternatives in JS or Rust). There are already a number of IPFS implementations out there so making a new one out of similar parts doesn’t seem like a stretch. As you mentioned the strawman version of this is pretty easy already you can run a kubo node and use a local (or public) HTTP gateway and call it ...
Cross-compatibility of IPFS and BitTorrent with WebSeeding - Ecosystem and Usage - IPFS Forums
tl;dr: Get BitTorrent clients to download and seed over both BT and IPFS, while reducing redundancy. We can use the same techniques to deduplicate or revive dead CIDs in general. Feedback appreciated. For background, GetRight style WebSeed links (BEP 19) are just regular web links that a BitTorrent client can download from: Many websites that list a BitTorrent download also provide a HTTP or FTP URL for the same file. The files are identical. A WebSeeding BitTorrent client can download from ei...
IPFS-powered Torrent Paradise is decentralized and invulnerable
A new torrent site called Torrent Paradise uses a decentralized platform that can’t be taken down by the authorities,.
Understanding IP Multicasting
Learn the basics of IP multicasting. How it works and how it is used. How multicasting differs from broadcasting.
Multicast - Wikipedia
Amber Case
Chain-of-Draft (CoD) Is The New King Of Prompting Techniques
A deep dive into the novel Chain-of-Draft (CoD) Prompting that reducing LLM inference cost and latency like never before.
Understanding Asynchronous Transfer Mode (ATM): A High-Speed Communication Protocol | Abdul Wahab Junaid
As network demands grew in the late 20th century for higher speed and more reliable transmission of multimedia data, Asynchronous Transfer Mode (ATM)
How a Token Ring Network Operates: A Detailed Overview | Abdul Wahab Junaid
Before Ethernet became the dominant local area network (LAN) technology, Token Ring was a widely used alternative. Developed by IBM in the 1980s and
Describing a Network Using Ethernet Technologies | Abdul Wahab Junaid
Ethernet is the most widely used technology in Local Area Networks (LANs) today. Known for its speed, scalability, and cost-effectiveness, Ethernet forms
The Three Core Categories of Networking Architectures: Bus, Ring, and Hierarchical Star | Abdul Wahab Junaid
Modern networking infrastructures are built on specific architectural models that define how devices are interconnected. These architectures determine the
DNS Load Balancing: The Illusion of Simplicity
Explore when to use DNS load balancing and the key conditions for its effectiveness in managing network traffic.
Uncurled
- Everything I know and learned about running and maintaining Open Source projects for three decades. For several years now, I have had a blog post series in mind to describe something about what people could expect to happen in Open Source projects. I had a few already half-started blog post drafts for some sub … Continue reading Uncurled →
Communal Bonfires
Online community platforms are assembly-kits for large, communal bonfires, designed to draw people towards the light and into the warm to...
Cozy Community Software
As Commune edges closer to an early-access release, I've been musing on the concept of the cozy web vibes that we intend to cultivate in ...
Fountain
RFC 9686: Registering Self-Generated IPv6 Addresses Using DHCPv6
This document defines a method to inform a DHCPv6 server that a device has one or more self-generated or statically configured addresses.
PATH should be a system call - simonsafar.com
Why Do Policy Languages Feel So Hard?
Policy languages can feel intimidating due to unfamiliar syntax, poor tooling, and the high stakes of getting access control wrong. But once understood, they simplify application logic and make security more reliable and maintainable.
Protocols not platforms for making change in complex human systems
It’s undeniable that in the time I have been publishing on the web (and before that on usenet and bbs’ dating back to 1992) we have seen a shift from protocols to platforms. Back in the…
The Future of AI-Driven Software Architecture: How AI is Transforming Technical Documentation - Stack Studio - Technical designs AI agent
Stack Studio is an AI-powered software TOOL that helps developers plan features effortlessly. Generate detailed technical designs, documentation, and architectural blueprints instantly—tailored to your prompts and codebase.
Your Mouse is a Database - ACM Queue
Among the hottest buzzwords in the IT industry these days is "big data," but the "big" is something of a misnomer: big data is not just about volume, but also about velocity and variety. The volume of data ranges from a small number of items stored in the closed world of a conventional RDMS (relational database management system) to a large number of items spread out over a large cluster of machines or across the entire World Wide Web.
Diskless Kafka: 80% Leaner, 100% Open
Apache Kafka® KIP-1150 introduces opt‑in Diskless Topics that replicate directly in object storage. Diskless slashes TCO and unlocks instant autoscaling, efficient geo‑replication, and per‑topic latency targets.
E.W. Dijkstra Archive: On the cruelty of really teaching computing science (EWD 1036)
Lessons from building and maintaining distributed systems at scale
When your architecture grows beyond a single container, things you thought were simple can now break in a variety of ways.In this post I want to highlight different lessons I learned while developing