System Architecture

System Architecture

7404 bookmarks
Custom sorting
Building an AWS EC2 Carbon Emissions Dataset
Building an AWS EC2 Carbon Emissions Dataset
Sharing an estimation of EC2 instances’ carbon footprint, related to both manufacturing and using the servers
·medium.com·
Building an AWS EC2 Carbon Emissions Dataset
Estimating AWS EC2 Instances Power Consumption
Estimating AWS EC2 Instances Power Consumption
TL;DR We simulated several kinds of workloads and measured memory and CPU consumption on five bare metal instances.
·medium.com·
Estimating AWS EC2 Instances Power Consumption
The Bespoke Supercomputing Architecture That Stood the Test of Time - The Next Platform
The Bespoke Supercomputing Architecture That Stood the Test of Time - The Next Platform
In the history of computing, there has been an endless push and pull between the need for general-purpose versus fine-tuned custom systems and software. While general purpose will, by nature, prevail on leadership-class HPC, the work done in meticulous world of ASIC design, system and software optimization filters into architectural thinking eventually. In the case
·nextplatform.com·
The Bespoke Supercomputing Architecture That Stood the Test of Time - The Next Platform
Building for tomorrow
Building for tomorrow
This series is all about infrastructure: the invisible layer of wires and guts and light that makes everything run. It’s not in the best shape, but what would it take to make it better?
·theverge.com·
Building for tomorrow
Trace Context
Trace Context
This specification defines standard HTTP headers and a value format to propagate context information that enables distributed tracing scenarios. The specification standardizes how context information is sent and modified between services. Context information uniquely identifies individual requests in a distributed system and also defines a means to add and propagate provider-specific context information.
·w3.org·
Trace Context
Simplifying Complexity: The Journey from WebSockets to HTTP Streams
Simplifying Complexity: The Journey from WebSockets to HTTP Streams
This article explores the transition from a WebSocket-based implementation to a simpler, more direct stream over HTTP in the context of capturing touch screen inputs on Linux. It begins by introducing the main theme, encapsulated in the statement Everything is a file is a stream of byte. The need to capture finger positions on a touchscreen by reading /dev/input/events in Linux is initially discussed, followed by a dilemma of transferring this data to a JavaScript client in a browser. Initially, WebSockets are chosen, leading to a discussion on how frameworks often shape our technological choices and the challenges faced in debugging WebSocket connections. The article then introduces an alternative about sending a stream of bytes over HTTP, drawing a parallel to Linux’s approach to handling devices and files. Serialization, the process of encoding messages for this stream, is discussed next, highlighting the implementation specifics in GoLang and its native advantages. The final section covers how to receive and decode this stream in JavaScript within a worker thread, and then send the decoded messages to the main thread using post requests. The article concludes by reflecting on the benefits of simplicity in technology, urging readers to reevaluate default choices and consider more straightforward solutions to complex problems.
·blog.owulveryck.info·
Simplifying Complexity: The Journey from WebSockets to HTTP Streams
EdDSA, Ed25519, Ed25519-IETF, Ed25519ph, Ed25519ctx, HashEdDSA, PureEdDSA, WTF?
EdDSA, Ed25519, Ed25519-IETF, Ed25519ph, Ed25519ctx, HashEdDSA, PureEdDSA, WTF?
The Edwards-curve Digital Signature Algorithm (EdDSA) You've heard of EdDSA right? The shiny and new signature scheme (well new, it's been here since 2008, wake up). Since its inception, EdDSA has evolved quite a lot, and some amount of standardization process has happened to it. It's even doomed to be adopted by the NIST in FIPS 186-5! First, some definition: EdDSA stands for Edwards-curve Digit ...
·cryptologie.net·
EdDSA, Ed25519, Ed25519-IETF, Ed25519ph, Ed25519ctx, HashEdDSA, PureEdDSA, WTF?
Git Query language
Git Query language
A SQL Like query language to perform queries on .git files.
·amrdeveloper.github.io·
Git Query language
ULIDs and Primary Keys
ULIDs and Primary Keys
Not all non-sequential primary keys are created equal, the ULID format is a fantastic substitute for the typical UUIDv4 choice.
·blog.daveallie.com·
ULIDs and Primary Keys
If You Want To Sell AI To Enterprises, You Need To Sell Ethernet - The Next Platform
If You Want To Sell AI To Enterprises, You Need To Sell Ethernet - The Next Platform
Server makers Dell, Hewlett Packard Enterprise, and Lenovo, who are the three largest original manufacturers of systems in the world, ranked in that order, are adding to the spectrum of interconnects they offer to their enterprise customers. And when we say that, we really do mean spectrum, and specially we mean the combination of Spectrum-4
·nextplatform.com·
If You Want To Sell AI To Enterprises, You Need To Sell Ethernet - The Next Platform
Fission
Fission
Fast Opensource Kubernetes Serverless Framework
·fission.io·
Fission
What is a URL Sandbox?
What is a URL Sandbox?
TLDR: A demo speaks louder than a thousand words. You can connect to a URL sandbox created by me and my team via browserling.com/browse. We run browsers in virtual machines and stream them to you as a video. This way, you can open suspicious URLs in a sandboxed environment without risking the security of your own...
·catonmat.net·
What is a URL Sandbox?
Deep dive into CheerpJ 3.0: A WebAssembly Java Virtual Machine for the browser
Deep dive into CheerpJ 3.0: A WebAssembly Java Virtual Machine for the browser
CheerpJ is a WebAssembly-based JVM that runs fully client side in the browser. It supports Java applications, legacy applets and libraries, with no need for compilation, server backends, plugins, or post-processing steps. CheerpJ 3.0 introduces a completely new JIT-based architecture which makes the tool faster, more usable and much more powerful.
·labs.leaningtech.com·
Deep dive into CheerpJ 3.0: A WebAssembly Java Virtual Machine for the browser
Redefining datacenter connectivity with open source networking - The Next Platform
Redefining datacenter connectivity with open source networking - The Next Platform
SPONSORED FEATURE: The face of modern networking is changing dramatically in parallel with the exponential increase in the volume of data traffic over the last several years. Enterprises and cloud service providers alike are struggling to handle that transmission workload, whilst simultaneously trying to contain costs. It’s a tall order to deliver enough capacity and
·nextplatform.com·
Redefining datacenter connectivity with open source networking - The Next Platform
How OpenID Connect Works - OpenID Foundation
How OpenID Connect Works - OpenID Foundation
What is OpenID Connect OpenID Connect is an interoperable authentication protocol based on the OAuth 2.0 framework of specifications (IETF RFC 6749 and 6750). It simplifies the way to verify the identity of users based on the authentication performed by an Authorization Server and to obtain user profile information in an interoperable and REST-like manner.OpenID
·openid.net·
How OpenID Connect Works - OpenID Foundation