System Architecture

System Architecture

7363 bookmarks
Custom sorting
Managing Data Residency - concepts and theory
Managing Data Residency - concepts and theory
Cloud computing has opened a Pandora’s Box of many original issues compared to sound old on-premise systems. I believe that chief among them is Data Residency, or Data Location: Data localization or data residency law requires data about a nation’s citizens or residents to be collected, processed, and/or stored inside the country, often before being transferred internationally. Such data is usually transferred only after meeting local privacy or data protection laws, such as givin
·blog.frankel.ch·
Managing Data Residency - concepts and theory
What Is a Large Language Model? - HackerRank Blog
What Is a Large Language Model? - HackerRank Blog
In this blog post, we'll take a deep dive into the world of large language models and explore what makes them so powerful.
·hackerrank.com·
What Is a Large Language Model? - HackerRank Blog
C to WASM to Go
C to WASM to Go
Blog for DoltHub, a website hosting databases made with Dolt, an open-source version-controlled SQL database with Git-like semantics.
·dolthub.com·
C to WASM to Go
Envisioning a Simplified Intel Architecture for the Future
Envisioning a Simplified Intel Architecture for the Future
PC computing rests heavily on Intel Architecture processors with an enormous installed base, and cloud computing is synonymous with Intel Architecture.
·intel.com·
Envisioning a Simplified Intel Architecture for the Future
3 Frameworks for Role-Based Access Control
3 Frameworks for Role-Based Access Control
Not all user environments are the same. One of the biggest challenges companies face is determining the access framework they should use for those data access controls. Here's what to think about as you choose the best approach for your needs.
·thenewstack.io·
3 Frameworks for Role-Based Access Control
India Declares CPU Independence With Aum HPC Processor
India Declares CPU Independence With Aum HPC Processor
At the moment, the most powerful Arm processor on the planet is the 48-core A64FX processor from Fujitsu, which was created as the heavily vectored
·nextplatform.com·
India Declares CPU Independence With Aum HPC Processor
Boost DevOps Maturity with a Data Lakehouse
Boost DevOps Maturity with a Data Lakehouse
With a data lakehouse, organizations can cope with high-cardinality data in a time- and cost-effective manner with long retention and granularity.
·thenewstack.io·
Boost DevOps Maturity with a Data Lakehouse
PCIe Deep Dive, Part 1: Tool Hunt
PCIe Deep Dive, Part 1: Tool Hunt
Small electric vehicles, motor controllers, robots, flying things, and other fun electromechanical stuff!
·scolton.blogspot.com·
PCIe Deep Dive, Part 1: Tool Hunt
A deep dive into PCIe
A deep dive into PCIe
Shane Colton digs into the PCIe PC bus specification and testing in the latest blog post: Something I found interesting about PCIe in general is that there seems to be a pretty large barrier built …
·blog.adafruit.com·
A deep dive into PCIe
Update your media files to speed up your website
Update your media files to speed up your website
Learn how to use transform your media files to create smaller file sizes, faster download times, and speed up your websites.
·blog.golivecosmos.com·
Update your media files to speed up your website
FUSE passthrough for file I/O
FUSE passthrough for file I/O
There are some filesystems that use the Filesystem in Userspace (FUSE) framework but only to provide a different view of an underlying filesystem, such as different file metadata, a changed directory hierarchy, or other changes of that sort. The read-only filtered filesystem, which simply filters the view of which files are available, is one example; the file data could come directly from the underlying filesystem, but currently needs to traverse the FUSE user-space server process. Finding a way to bypass the server, so that the file I/O operations go directly from the application to the underlying filesystem would be beneficial. In a filesystem session at the 2023 Linux Storage, Filesystem, Memory-Management and BPF Summit, Miklos Szeredi wanted to explore different options for adding such a mechanism, which was referred to as a "FUSE passthrough"—though "bypass" might be a better alternative.
·lwn.net·
FUSE passthrough for file I/O
An Introduction to TLA+ and Its Use in Parties
An Introduction to TLA+ and Its Use in Parties
TLA+ is a system for modeling all possible states of a system. On this model, you can then verify certain properties of this system. Smart people can use this to check that their thread scheduling runs all threads equally, or that their work queue will never overflow. In this article, we'll try and verify the fraught process of ordering pizza for a pizza party as a small introduction to the concepts and syntax of TLA+.
·innoq.com·
An Introduction to TLA+ and Its Use in Parties
Understanding database Indexes in PostgreSQL
Understanding database Indexes in PostgreSQL
Understand SQL indexes, organize your knowledge, and memorize good practices regarding performance optimization in PostgreSQL.
·blog.mastermind.dev·
Understanding database Indexes in PostgreSQL
Peer-to-peer DMA
Peer-to-peer DMA
In a plenary session on the first day of the 2023 Linux Storage, Filesystem, Memory-Management and BPF Summit, Stephen Bates led a discussion about peer-to-peer DMA (P2PDMA). The idea is to remove the host system's participation in a transfer of data from one PCIe-connected device to another. The feature was originally aimed at NVMe SSDs so that data could simply be copied directly to and from the storage device without needing to move it to system memory and then from there to somewhere else.
·lwn.net·
Peer-to-peer DMA