System Architecture

System Architecture

7667 bookmarks
Custom sorting
We made our infrastructure read-only and never looked back
We made our infrastructure read-only and never looked back
Learn why read-only infrastructure eliminates entire classes of security attacks, improves reproducibility, and simplifies compliance while enabling predictable deployments.
·devcenter.upsun.com·
We made our infrastructure read-only and never looked back
Expert Systems: The Dawn Of AI
Expert Systems: The Dawn Of AI
We’ll be honest. If you had told us a few decades ago we’d teach computers to do what we want, it would work some of the time, and you wouldn’t really be able to explain or predic…
·hackaday.com·
Expert Systems: The Dawn Of AI
New Military Helmet Confers Video-Game-like Abilities - Core77
New Military Helmet Confers Video-Game-like Abilities - Core77
In Mark Bowden's book "Black Hawk Down," he notes that young soldiers repeatedly describe the shocking surreality of combat as "like being in a movie." As the book covers events that occurred in 1993, these soldiers have no other frame of reference. The soldier of today grew up in a
·core77.com·
New Military Helmet Confers Video-Game-like Abilities - Core77
Connector-Free Zone: PCB Edge As USB-C Interfaces
Connector-Free Zone: PCB Edge As USB-C Interfaces
Sometimes when you’re making a PCB that you plan on programming over USB, but you only plan on plugging in a couple of times, it would be nice to make that connection without another BOM item…
·hackaday.com·
Connector-Free Zone: PCB Edge As USB-C Interfaces
RFC 2693: SPKI Certificate Theory
RFC 2693: SPKI Certificate Theory
This document gives the theory behind SPKI certificates and ACLs without going into technical detail about those structures or their uses. This memo defines an Experimental Protocol for the Internet community.
·datatracker.ietf.org·
RFC 2693: SPKI Certificate Theory
RFC 2692: SPKI Requirements
RFC 2692: SPKI Requirements
The SPKI Working Group first established a list of things one might want to do with certificates (attached at the end of this document), and then summarized that list of desires into requirements. This document presents that summary of requirements. This memo defines an Experimental Protocol for the Internet community.
·datatracker.ietf.org·
RFC 2692: SPKI Requirements
Building Websites That Grow With You: Why Composable Web Architecture Is the Future - The Tech Block
Building Websites That Grow With You: Why Composable Web Architecture Is the Future - The Tech Block
Every business today depends on its website to connect with customers, but too often those websites turn into roadblocks instead of tools for growth. They slow down, break when updated, or become difficult to maintain without hiring a full-time developer. Modern marketing teams need something different: websites that are fast, flexible, and built to evolve
·thetechblock.com·
Building Websites That Grow With You: Why Composable Web Architecture Is the Future - The Tech Block
Corrosion
Corrosion
Corrosion is distributed service discovery based on Rust, SQLite, and CRDTs.
·fly.io·
Corrosion
How Startpage Works
How Startpage Works
Compare how Startpage stacks up next to non-private search engines.
·startpage.com·
How Startpage Works
Disco - Self-hosting that doesn't feel like self-hosting
Disco - Self-hosting that doesn't feel like self-hosting
Disco is an open-source PaaS that turns any Linux server into a deployment platform. Get the git push workflow you love, without the per-app markup.
·disco.cloud·
Disco - Self-hosting that doesn't feel like self-hosting
Common misconceptions about screen readers - TetraLogical
Common misconceptions about screen readers - TetraLogical
Screen readers are familiar to many in digital, but how they work in practice can be less clear. In this post, we shed some light on the topic.
·tetralogical.com·
Common misconceptions about screen readers - TetraLogical
Scaling Innovation: Building Ecosystems | Hazel Weakly
Scaling Innovation: Building Ecosystems | Hazel Weakly
Innovation is a tricky subject. The precise details of how to do it are not well studied, at least not under the name “innovation”. In addition, multiple...
·hazelweakly.me·
Scaling Innovation: Building Ecosystems | Hazel Weakly
What is good software architecture?
What is good software architecture?
What good architecture looks like, how to improve your skill at building it –and why Architects are not always the answer. Guest post by Matthew Hawthorne, who built large systems at Netflix & Twitter
·newsletter.pragmaticengineer.com·
What is good software architecture?
Using Git Pre-Commit Hooks - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
Using Git Pre-Commit Hooks - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
A while ago I wrote an article about linting Markdown files with markdownlint. In that article, I presented the use case of linting the Markdown source files for this site. While manually running linting checks is fine—there are times and situations when this is appropriate and necessary—this is the sort of task that is ideally suited for a Git pre-commit hook. In this post, I’ll discuss Git pre-commit hooks in the context of using them to run linting checks.
·blog.scottlowe.org·
Using Git Pre-Commit Hooks - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
General purpose agentic loop in 40 lines of Python
General purpose agentic loop in 40 lines of Python
Drop in any well-typed Python function; the loop builds the tool schema and wiring for you. How I build dumb demos and experiments.
·softwaredoug.com·
General purpose agentic loop in 40 lines of Python
Your data model is your destiny
Your data model is your destiny
Your product's core abstractions determine whether new features compound into a moat or just add to a feature list. Here's how to get it right.
·notes.mtb.xyz·
Your data model is your destiny