System Architecture

System Architecture

7363 bookmarks
Custom sorting
Hammering Out A Logical File System And A DNS For Data - The Next Platform
Hammering Out A Logical File System And A DNS For Data - The Next Platform
Data is by its nature a messy beast, and it has only become more so as workloads have found their way out of the datacenter and into the cloud and even all the way out to the edge. This is the problem that San Mateo, California-based Hammerspace, founded by David Flynn of Fusion-io fame, has
·nextplatform.com·
Hammering Out A Logical File System And A DNS For Data - The Next Platform
Introduction to P2P Networks – Fission
Introduction to P2P Networks – Fission
Peer-to-peer networks are the foundation of the decentralized web. Today we dive into what P2P networks are, how they differ from the popular client-server model, and the advantages of decentralized file sharing in P2P networks.
·fission.codes·
Introduction to P2P Networks – Fission
Everyday Design Patterns
Everyday Design Patterns
Exploring the common software design patterns in the context of Ruby on Rails.
·levelup.gitconnected.com·
Everyday Design Patterns
3 Reasons Why Teams Move Away from AWS Lambda
3 Reasons Why Teams Move Away from AWS Lambda
Here's why teams move away from AWS Lambda to lower-level computing abstractions and how you can migrate smoothly to functions running on Amazon EKS.
·thenewstack.io·
3 Reasons Why Teams Move Away from AWS Lambda
The 11 Aspects of Good Code
The 11 Aspects of Good Code
Lessons on code quality start in the first few weeks of learning to program, when a newcomer to the field is taught the basics of variable n...
·pathsensitive.com·
The 11 Aspects of Good Code
RFC 9420: The Messaging Layer Security (MLS) Protocol
RFC 9420: The Messaging Layer Security (MLS) Protocol
Messaging applications are increasingly making use of end-to-end security mechanisms to ensure that messages are only accessible to the communicating endpoints, and not to any servers involved in delivering messages. Establishing keys to provide such protections is challenging for group chat settings, in which more than two clients need to agree on a key but may not be online at the same time. In this document, we specify a key establishment protocol that provides efficient asynchronous group key establishment with forward secrecy (FS) and post-compromise security (PCS) for groups in size ranging from two to thousands.
·rfc-editor.org·
RFC 9420: The Messaging Layer Security (MLS) Protocol
7 Principles of the Decentralized Web – Fission
7 Principles of the Decentralized Web – Fission
The decentralized web, or Web3, has several key characteristics that differentiate it from Web2. Here are seven core principles that define the decentralized web and their associated benefits.
·fission.codes·
7 Principles of the Decentralized Web – Fission
Scale finds edgy replacement now that Intel's shut down NUC – Blocks and Files
Scale finds edgy replacement now that Intel's shut down NUC – Blocks and Files
Intel has signalled the end-of-life for its low-cost NUC mini-server line of PCs, which means Scale Computing will have to find a replacement edge system hardware supplier. And it’s found one: Simply NUC. NUC is Intel’s grandly named Next Unit of Compute, a small form-factor PC which has a 4-inch by 4-inch board inside with […]
·blocksandfiles.com·
Scale finds edgy replacement now that Intel's shut down NUC – Blocks and Files
Linux Is The Next Platform, But Who Pays To Maintain It? - The Next Platform
Linux Is The Next Platform, But Who Pays To Maintain It? - The Next Platform
Red Hat has once again dropped another huge boulder into the normally serene – or at least relatively calm – open source waters. Back in December 2020 it killed off the CentOS distribution that lives downstream from Red Hat Enterprise Linux and created the CentOS Stream variant that lives upstream where bugs are not yet
·nextplatform.com·
Linux Is The Next Platform, But Who Pays To Maintain It? - The Next Platform
The Disconnected State of Enterprise Risk Management
The Disconnected State of Enterprise Risk Management
It's time for compliance to play in tune and in tempo with the entire orchestra: security, risk, threat intelligence and incident response.
·thenewstack.io·
The Disconnected State of Enterprise Risk Management
Indexing optimization guide
Indexing optimization guide
Get a quick grasp of the best practices for fast and efficient data indexing with our short guide.
·blog.meilisearch.com·
Indexing optimization guide