System Architecture

System Architecture

7363 bookmarks
Custom sorting
Ditching Databases for Apache Kafka as System of Record
Ditching Databases for Apache Kafka as System of Record
At KOR Financial, using this approach has provided immense flexibility and scalability in our data architecture, and enabled lean and agile operations.
·thenewstack.io·
Ditching Databases for Apache Kafka as System of Record
TLS Tunnel - Pinggy
TLS Tunnel - Pinggy
A TLS tunnel is a secure, end-to-end encrypted channel that enables clients to communicate with servers while preventing malicious eavesdropping. You can easily create a TLS tunnel using Pinggy and connect to your localhost servers securely. You do not need to download anything to create a TLS tunnel.
·pinggy.io·
TLS Tunnel - Pinggy
Datalog
Datalog
Learn Datalog programming for graph reasoning and incremental logic processing.
·datalog.dev·
Datalog
How to Learn Nix, Part 44: More flakes, unfortunately
How to Learn Nix, Part 44: More flakes, unfortunately
Okay. In the last post I got sort of an introduction to flakes, and I even wrote a flake, but I didn’t learn how to… do anything with flakes. My flake provided an overlay, but I have no idea how to make my Nixpkgs actually use that overlay. I have no idea what “my Nixpkgs” even means anymore. My channel? My flake? Everything I’ve learned about Nix has been turned upside down. But presumably if we keep reading, these blog posts will explain how to actually put them to use.
·ianthehenry.com·
How to Learn Nix, Part 44: More flakes, unfortunately
Data Modeling, RDF, & OWL – Part One: An Introduction To Ontologies
Data Modeling, RDF, & OWL – Part One: An Introduction To Ontologies
Published in TDAN.com April 2006 [This is the first of three articles discussing the new/old ideas of semantics and ontology and how they affect the way we analyze data.  This article introduces the main concepts, and the second article will show an example of converting a data model to the web ontology language, OWL.] Everyone […]
·tdan.com·
Data Modeling, RDF, & OWL – Part One: An Introduction To Ontologies
Blaze: A lightweight literate programing preprocessor
Blaze: A lightweight literate programing preprocessor
⊕I’ve been playing with many literate programming tools since this technique of document-first programming came into my life two years ago.Literate programmi...
·0atman.com·
Blaze: A lightweight literate programing preprocessor
Eve
Eve
Eve: Programming designed for humans.
·witheve.com·
Eve
Information Hazards - LessWrong
Information Hazards - LessWrong
An Information Hazard is some true information that could harm people, or other sentient beings, if known. It is tricky to determine policies on information hazards. Some information might genuinely be dangerous, but excessive controls on information has its own perils.  This tag is for discussing the phenomenon of Information Hazards and what to do with them. Not for actual Information Hazards themselves. An example might be a formula for easily creating cold fusion in your garage, which would be very dangerous. Alternatively, it might be an idea that causes great mental harm to people. Bostrom's Typology of Information Hazards Nick Bostrom coined the term information hazard in a 2011 paper [1] for Review of Contemporary Philosophy. He defines it as follows: Information hazard: A risk that arises from the dissemination or the potential dissemination of (true) information that may cause harm or enable some agent to cause harm. Bostrom points out that this is in contrast to the generally accepted principle of information freedom and that, while rare, the possibility of information hazards needs to be considered when making information policies. He proceeds to categorize and define a large number of sub-types of information hazards. For example, he defines artificial intelligence hazard as: Artificial intelligence hazard: There could be computer-related risks in which the threat would derive primarily from the cognitive sophistication of the program rather than the specific properties of any actuators to which the system initially has access. The following table is reproduced from Bostrom 2011 [1]. TYPOLOGY OF INFORMATION HAZARDSI. By information transfer mode Data hazard Idea hazardAttention hazardTemplate hazardSignaling hazardEvocation hazardII. By effect TYPESUBTYPEADVERSARIAL RISKSCompetiveness hazardEnemy HazardIntellectual property hazardCommitment hazardKnowing-too-much hazardRISKS TO SOCIAL ORGANIZATION AND MARKETSNorm hazardInformation asymmetry
·lesswrong.com·
Information Hazards - LessWrong
7 Essential Design Principles for Clean and Effective Code
7 Essential Design Principles for Clean and Effective Code
These lesser-known programming principles simplify code, making it shorter, easier to understand, and more flexible and reusable, like…
·python.plainenglish.io·
7 Essential Design Principles for Clean and Effective Code
LongFi: Wireless Technology of the Helium Network
LongFi: Wireless Technology of the Helium Network
LongFi Technology works with the Helium Network to connect multiple devices to various Hot Spots in a peer to peer Network.
·data-alliance.net·
LongFi: Wireless Technology of the Helium Network
Home | LongFi USA
Home | LongFi USA
LongFi USA is building a strong network in your area, why not get paid to help build the world's first decentralized LongFi network for Internet Of Things devices.
·longfiusa.com·
Home | LongFi USA
A Middle Path for Data Sovereignty: Bring Your Own Cloud
A Middle Path for Data Sovereignty: Bring Your Own Cloud
Traditional cloud services force us to choose between data sovereignty and a fully managed experience. BYOC lets you have your cake and eat it too.
·thenewstack.io·
A Middle Path for Data Sovereignty: Bring Your Own Cloud
The Architect’s Guide to Thinking about Hybrid/Multicloud
The Architect’s Guide to Thinking about Hybrid/Multicloud
Going multicloud should not lead to a ballooning IT budget and inability to hit milestones. It should help you manage costs and accelerate the roadmap.
·thenewstack.io·
The Architect’s Guide to Thinking about Hybrid/Multicloud