System Architecture

System Architecture

7404 bookmarks
Custom sorting
Introducing IRONdb
Introducing IRONdb
Software is eating the world. Devices that run that software are ubiquitous and multiplying rapidly. Without adequate monitoring on these services,
·circonus.com·
Introducing IRONdb
Data Mapping 101: A Complete Guide
Data Mapping 101: A Complete Guide
Data mapping tools have evolved significantly over the past years. Find out how you can choose the right data mapping tool in 2023.
·astera.com·
Data Mapping 101: A Complete Guide
AI-Powered Incident Intelligence for ITOps
AI-Powered Incident Intelligence for ITOps
BigPanda’s AIOps platform helps ITOps teams prevent, manage, and resolve IT incidents with intelligent automation. See how Fortune 500 companies are reducing IT costs.
·bigpanda.io·
AI-Powered Incident Intelligence for ITOps
Cookie Permissions 101
Cookie Permissions 101
Cookie permissions need to follow the law and strike the balance between respecting user privacy and being user-friendly.
·nngroup.com·
Cookie Permissions 101
Army Cites Data, Culture for Zero Trust Success
Army Cites Data, Culture for Zero Trust Success
The Army's Unified Network Plan and Data Plan are driving zero trust implementation, but workforce training and education are key.
·governmentciomedia.com·
Army Cites Data, Culture for Zero Trust Success
AI is about to completely change how you use computers
AI is about to completely change how you use computers
In 5 years, agents will be able to give health care advice, tutor students, do your shopping, help workers be far more productive, and much more
·gatesnotes.com·
AI is about to completely change how you use computers
Automating Data Augmentation: Practice, Theory and New Direction
Automating Data Augmentation: Practice, Theory and New Direction
Data augmentation is a de facto technique used in nearly every state-of-the-art machine learning model in applications such as image and text classification. Heuristic data augmentation schemes are often tuned manually by human experts with extensive domain knowledge, and may result in suboptimal augmentation policies. In this blog post, we provide a broad overview of recent efforts in this exciting research area, which resulted in new algorithms for automating the search process of transformation functions, new theoretical insights that improve the understanding of various augmentation techniques commonly used in practice, and a new framework for exploiting data augmentation to patch a flawed model and improve performance on crucial subpopulation of data.
artificially expanding labeled training datasets
·ai.stanford.edu·
Automating Data Augmentation: Practice, Theory and New Direction
The Business Case for a Data Refinery
The Business Case for a Data Refinery
Crude data is similar to crude oil—in its raw form, it’s usually too messy to be useful
·blogs.scientificamerican.com·
The Business Case for a Data Refinery
Pentagon Developing Data Integration Layer to Enable JADC2
Pentagon Developing Data Integration Layer to Enable JADC2
The Defense Department's Chief Digital and AI Office is working to understand the resources needed for integration of the department-wide framework.
·governmentciomedia.com·
Pentagon Developing Data Integration Layer to Enable JADC2
Time-series data simplified | Timescale
Time-series data simplified | Timescale
TimescaleDB is a time-series SQL database providing fast analytics, scalability, with automated data management on a proven storage engine.
·timescale.com·
Time-series data simplified | Timescale
Socket.IO
Socket.IO
SOCKET.IO 4.0 IS HERE ~/Projects/tweets/index.js const io = require('socket.io')(80); const cfg = require('./config.js
·socket.io·
Socket.IO
Fan-out Fan-in Pattern Vs. Producer-Consumer Pattern
Fan-out Fan-in Pattern Vs. Producer-Consumer Pattern
The producer-consumer pattern and the fan-out fan-in pattern are both used to manage workloads and process data concurrency, but they have…
·medium.com·
Fan-out Fan-in Pattern Vs. Producer-Consumer Pattern
The Age of Insecurity
The Age of Insecurity
Astra Taylor discusses her new book about how modern capitalism undermines social stability.
·prospect.org·
The Age of Insecurity
Fifteen ways to use Embark
Fifteen ways to use Embark
Update (2021-10-16): While this list was intended as a demonstration of the kinds of things you can do with Embark, there has been some interest by readers in reproducing these demos exactly on their machines. So I have added a “Play by play” section under each demo listing the sequence of actions in the demo. Embark is a fantastic and thoughtfully designed package for Emacs that flips Emacs’ action → object ordering without adding a learning curve.
·karthinks.com·
Fifteen ways to use Embark
Greg Morris - Just Don’t Remove The Function Keys
Greg Morris - Just Don’t Remove The Function Keys
Think way back to 2016. The X-Files came back after 14 years, a 4-inch lock of John Lennon’s hair sold for $35,000 and there was a baby born with DNA from three parents. Weirdness all around, especially on the Apple campus. They were convinced the iPad was the future of computing, deep into “what’s a computer” thinking yet still produced laptops with 3-year-old chips in them. Whilst everyone pointed towards a touchscreen Mac, they instead gave users a weird strip you could interact with and took away their function keys.
·gr36.com·
Greg Morris - Just Don’t Remove The Function Keys
RFC 9525: Service Identity in TLS
RFC 9525: Service Identity in TLS
Many application technologies enable secure communication between two entities by means of Transport Layer Security (TLS) with Internet Public Key Infrastructure using X.509 (PKIX) certificates. This document specifies procedures for representing and verifying the identity of application services in such interactions. This document obsoletes RFC 6125.
·rfc-editor.org·
RFC 9525: Service Identity in TLS