MultiValue database - Wikipedia
System Architecture
Pick operating system - Wikipedia
Case Study: Proactive IT Category Management Strategies to Ensure Business Alignment (IKEA)
Gartner Information Technology Research on Case Study: Proactive IT Category Management Strategies to Ensure Business Alignment (IKEA)
The secret taxonomy behind IKEA’s product names, from Billy to Poäng
Reading strange-sounding Swedish words is part of the joy of shopping at IKEA. Within the labyrinth of stylish flat pack furniture is a pänoply of ödd, åccented pröduct nämes, printed on hang tags, walls and banners. What most shoppers don’t know is that the names of those 12,000 products conform to a strict internal logic that offers a peek into Scandinavian culture.
Scalable System Design Patterns
System Design Refresher
Making Impossible States Impossible: Type-Safe Domain Modeling with Functional Dependency Injection
Learn how to use rich types, phantom types, and partial application to eliminate impossible states and implement Clean Architecture's dependency inversion in a functional way. Discover why the compiler is your best friend for building robust domain models.
Content Addressable Storage - namvdo's blog
If you’re working on a modern JavaScript application and use a build tool like Vite to build and deploy your code, you can open the dist folder and find out […]
FFMPEG assembly language lessons
The FFmpeg School of Assembly Language provides a first step on the most interesting, challenging, and rewarding journey in programming. The lessons give a grounding in the way assembly language is…
HTTP Headers to Build 10X APIs 🔥
#83: Break Into HTTP Headers (15 Minutes)
Codemia | The Evolution of Linux CPU Schedulers: From O(1) to CFS to User‑Space Scheduling
AppStream Report for AerynOS - Start
Filesystem Hierarchy Standard - Wikipedia, the free encyclopedia
Intuition behind Power of 2 Choices Load balancing | Amandeep Singh
Discover how power of two load balancing reduces hotspots, achieves O(log log n) max load, and connects to cuckoo hashing for efficiency.
The Case for MyTerms
We know more than we can tell. That was how Michael Polanyi distinguished between tacit and explicit knowing. We may know tacitly how we form speech, ride a bike, or sense when to shake hands with …
Codemia | NUMA Is the New Network: How Per-Socket Memory Models Are Reshaping Microservice Placement
Payment Processor Fun 2025 -- Making Your Own MSP
Introduction to VirtIO, Part 2: Vhost
An excellent detailed second blog on the subject of VirtIO, this time focusing on Vhost.
SHRDLU - Wikipedia
On the Value of Abstractions
A reflection on why starting with abstractions—even simple ones—pays off in real-world development.
Universal Tool Calling Protocol (UTCP): A Revolutionary Alternative to MCP
A Comprehensive Guide to the Safer, Scalable Alternative to Model Context Protocol
Building a Carbon and Price-Aware Kubernetes Scheduler
Kubernetes and cloud infrastructure have revolutionized how we deploy and manage applications and services, but with traditional data…
Instruction set architecture - Wikipedia
Man-Computer Symbiosis
Fiat–Shamir heuristic - Wikipedia
What is zk-SNARKs? An Introduction to this Privacy Protocol
Guide to zk-Snarks & how this technology works within privacy cryptocurrencies such as ZCash, Bitcoin Private & inclusion in Ethereum.
What Are Bullet Proofs? Guide to Confidential Cryptocurrency Transactions
Bulletproofs are an important innovation of zero-knowledge proofs & other protocols used to secure and obfuscate cryptocurrency transactions
Intel® Gaudi® 3 AI Accelerator HL-338 PCIe Add-In Card Product Brief
The Intel® Gaudi® 3 Al accelerator PCIe card (HL-338) is designed to deliver performance and efficiency in a standard PCIe card form factor. The training and inference accelerator is built on the Intel® Gaudi® 5th generation high-efficiency heterogeneous architecture, now in 5nm process technology with state-of-the-art performance, scalability and power efficiency.
Intergalactic Computer Network - Wikipedia
Man–Computer Symbiosis - Wikipedia
Why Generics Belong in Infrastructure, Not in Architecture
Generics are a low-level tool. They are powerful, but dangerous when they escape into the higher layers