Multi-party computation is (sort of) changing the game — Blog — Evervault
System Architecture
Paper Notes: Megastore- Providing Scalable, Highly Available Storage for Interactive Services – Distributed Computing Musings
Fluree Developers | Fluree Developers
Semantic graph data management system built with web3 tech
Why We Exist | Building the Circular Economy for Data | Fluree
Fluree exists to make information trusted and accessible so that people can improve the world together. The Circular Economy of Data eliminates data waste and promotes ethical data sharing.
Zen and the Art of Logging
Linux Live Patching: Vulnerability Patching Without Reboots
Welcome to the brave new world of Linux live patching, where applying patches and updates is finally smooth, non-disruptive, and automatable!
Announcing IPFS Grant for IPVM Decentralized WebAssembly Computation – Fission
We're pleased to announce that Fission has received an $ 800,000 USD grant to support further applied research of the InterPlanetary Virtual Machine (IPVM) protocols and the Homestar reference implementation from the Arcological Association and the IPFS Network Capital Pool.
5 Differences Between an API Gateway and Service Mesh : @VMblog
Understand the key differences between API gateways and service meshes. Discover their distinct roles and benefits in modern software development.
Raku: A Language for Gremlins
By Gremlins, For Gremlins™
Mofi - Snappy UIs With WebAssembly and Web Workers
New Browser APIs That Every Web Developer Should Know
Use these implementation mechanisms to create user-friendly, futuristic web apps
Documenting Software in Development Projects: Types, Best Practices, and Tools - Stratoflow
Dive into documenting software within development projects. Learn types, best practices & tools for effective development management. Elevate your projects now.
Breaking Changes in Distributed Systems
Distributed systems don't have atomic deployments so making breaking changes requires careful planning.
The Cloud Is a Prison. Can the Local-First Software Movement Set Us Free?
Tired of relying on Big Tech to enable collaboration, peer-to-peer enthusiasts are creating a new model that cuts out the middleman. (That’s you, Google.)
Voyager 2 phones home and says everything is cool
After sending the command, NASA had to wait 37 hours for a response.
Quotient Filter Explained
an approximate membership query filter
System Design Concepts: Dive deep into Database Sharding Strategies
Sharding Strategies, their pros and cons.
How to Prevent Zombie APIs - DevOps.com
Zombie APIs might cause considerable problems, but there are some actionable steps DevOps teams can take to prevent them.
New – AWS Public IPv4 Address Charge + Public IP Insights | Amazon Web Services
We are introducing a new charge for public IPv4 addresses. Effective February 1, 2024 there will be a charge of $0.005 per IP per hour for all public IPv4 addresses, whether attached to a service or not (there is already a charge for public IPv4 addresses you allocate in your account but don’t attach to […]
Berkeley Open Infrastructure for Network Computing - Wikipedia
Empowering Users with User-Owned Data: A Path to Data Privacy and Control – Fission
At Fission, we believe that people and the communities they belong to deserve more agency over their data. Let's review some solutions to preserving data agency and their advantages.
PCI Express explores PC tech that will run on light
The group behind the PC's PCI Express bus is exploring using light instead of electricity to transfer data inside a PC, saving power and potentially increasing performance dramatically.
What Is CSS? Exploring the Stylist of the Web - HackerRank Blog
What is CSS? In this article, we explore the history of CSS, its key features and advantages, and examples of its applications.
Nvidia AI Image Generator Fits on a Floppy Disk and Takes 4 Minutes to Train - Decrypt
Perfusion, a new text to image personalization method developed by Nvidia weights 100Kb and takes around four minutes to be trained.
Key-Locked Rank One Editing for Text-to-Image Personalization
DICT - Wikipedia
A Guide to UCANs – Fission
UCANs are a secure way to handle authorization in distributed systems.
Announcing the Socket Web Extension - Socket
Socket is now offering a free browser extension to verify the security and quality of packages on NPM.
Don't Confuse Complex with Complicated, Part 1: What is Information?
We can’t talk about complexity and simplicity without first defining what we mean when we talk about "information."
How to Integrate Social Logins the Right Way
A guide to creating a solution that avoids security pitfalls, scales well to many components, is easily extendable and requires only simple code.