System Architecture

System Architecture

7363 bookmarks
Custom sorting
Hinted Handoff
Hinted Handoff
distributed system pattern
·systemdesign.one·
Hinted Handoff
Consistent Hashing Explained
Consistent Hashing Explained
1. Hashed IP addresses are used to assign a position for the nodes 2. Hash ring is traversed until a node is found
·systemdesign.one·
Consistent Hashing Explained
Intel Gets Its Chiplets In Order With 5th Gen Xeon SPs - The Next Platform
Intel Gets Its Chiplets In Order With 5th Gen Xeon SPs - The Next Platform
Based on what Intel has been saying for the past several weeks in various events, but especially the Hot Chips 2023 a few weeks ago and the more recent Intel Innovation 2023 extravaganza, the company’s foundry process roadmap and its server processor roadmaps are going to align harmoniously to make the Xeon SP family of
·nextplatform.com·
Intel Gets Its Chiplets In Order With 5th Gen Xeon SPs - The Next Platform
5 Hard Problems in Vector Search, and How Cassandra Solves Them
5 Hard Problems in Vector Search, and How Cassandra Solves Them
Vector search engines are an important new database feature with multiple architectural challenges, including scale-out, garbage collection, concurrency, effective use of disk, and composability. Here is how DataStax added these features to Astra DB.
·thenewstack.io·
5 Hard Problems in Vector Search, and How Cassandra Solves Them
PostgreSQL 16 Expands Analytics Capabilities
PostgreSQL 16 Expands Analytics Capabilities
The recent release also includes improvements for logical representations, which support new architectures, and superuser permissions.
·thenewstack.io·
PostgreSQL 16 Expands Analytics Capabilities
The Basics of Event-Driven Architectures
The Basics of Event-Driven Architectures
This blog post explores the emergence of event-driven architectures (EDAs) and the components that make up event-driven systems. It also presents two fundamental design patterns that help illustrate how the components of event-driven architectures work together.
·thenewstack.io·
The Basics of Event-Driven Architectures
The 6 Pillars of Platform Engineering: Part 1 — Security
The 6 Pillars of Platform Engineering: Part 1 — Security
Platform team workflows and checklists for building security, pipelines, provisioning, connectivity, orchestration, and observability into their platform.
·thenewstack.io·
The 6 Pillars of Platform Engineering: Part 1 — Security
Beyond the Traveling Salesman: Escape Routes Get a Quantum Overhaul - The Next Platform
Beyond the Traveling Salesman: Escape Routes Get a Quantum Overhaul - The Next Platform
When it comes to natural disasters, every second counts—and the clock may just be ticking a little slower following a collaboration between Terra Quantum and Honda Research Institute Europe (HRI-EU). By entangling quantum computing with traditional algorithms, the team has paved a 'superposition' of escape routes designed to evacuate people more quickly and efficiently in
·nextplatform.com·
Beyond the Traveling Salesman: Escape Routes Get a Quantum Overhaul - The Next Platform
RFC 9232: Network Telemetry Framework
RFC 9232: Network Telemetry Framework
Network telemetry is a technology for gaining network insight and facilitating efficient and automated network management. It encompasses various techniques for remote data generation, collection, correlation, and consumption. This document describes an architectural framework for network telemetry, motivated by challenges that are encountered as part of the operation of networks and by the requirements that ensue. This document clarifies the terminology and classifies the modules and components of a network telemetry system from different perspectives. The framework and taxonomy help to set a common ground for the collection of related work and provide guidance for related technique and standard developments.
·rfc-editor.org·
RFC 9232: Network Telemetry Framework
What Is a Proximity Key? - Pop-A-Lock
What Is a Proximity Key? - Pop-A-Lock
Most new cars come with some form of keyless entry, whether it’s a proximity key or a push-button start. Here’s how these features work and what they do.
·popalock.com·
What Is a Proximity Key? - Pop-A-Lock
The Outbox Pattern with Mongo, Kafka and Debezium in C# - Vasil Kosturski
The Outbox Pattern with Mongo, Kafka and Debezium in C# - Vasil Kosturski
Discover a practical solution for the Dual Write Problem in distributed systems using the Outbox Pattern. This guide presents a C# demo app with MongoDB, Kafka, and Debezium, illustrating reliable data propagation between services.
·vkontech.com·
The Outbox Pattern with Mongo, Kafka and Debezium in C# - Vasil Kosturski
The New UXL Foundation’s Has a Bold Blueprint for Open Acceleration - The Next Platform
The New UXL Foundation’s Has a Bold Blueprint for Open Acceleration - The Next Platform
Heterogeneous computing is clearly here to stay but now’s the time to get down to brass tacks and start addressing standards, portability, and other elements common to maturing technologies. The need to integrate various types of processors, including CPUs, GPUs, and specialized chips for AI and other applications is clear, thus today we’re met with
·nextplatform.com·
The New UXL Foundation’s Has a Bold Blueprint for Open Acceleration - The Next Platform
AMD Finishes Out The Zen4 Server CPUs With Edgy “Siena” - The Next Platform
AMD Finishes Out The Zen4 Server CPUs With Edgy “Siena” - The Next Platform
Different workloads need different mixes of price, performance, thermals, and longevity in the field out there on the edge and in the datacenter, and that is why server CPU makers for years have had a mix of processors that deliver on these vectors that are different from each other. What makes 2023 different from 2003
·nextplatform.com·
AMD Finishes Out The Zen4 Server CPUs With Edgy “Siena” - The Next Platform
Skip the API, Ship Your Database
Skip the API, Ship Your Database
The best code is the code unwritten. Avoid building a complex API layer by sharing your database between services.
·fly.io·
Skip the API, Ship Your Database