System Architecture

System Architecture

7363 bookmarks
Custom sorting
When Imperfect Systems are Good, Actually: Bluesky’s Lossy Timelines
When Imperfect Systems are Good, Actually: Bluesky’s Lossy Timelines
By examining the limits of reasonable user behavior and embracing imperfection for users who go beyond it, we can continue to provide service that meets the expectations of users without sacrificing scalability of the system.
·jazco.dev·
When Imperfect Systems are Good, Actually: Bluesky’s Lossy Timelines
Introduction to VirtIO
Introduction to VirtIO
If you want to learn about the technical aspects of VirtIO, then this is the blog for you.
·blogs.oracle.com·
Introduction to VirtIO
Documenting Event-Driven Architecture with EventCatalog and David Boyne
Documenting Event-Driven Architecture with EventCatalog and David Boyne
If you're wondering on how to document Event-Driven Architecture, or you don't know that you should, I have something for you. We discussed with David Boyne, why data governance practices and documenting is essential on building maintainable and evolvable systems. David also showed us also how EventCatalog can help in that. Watch this hands-on webinar to learn more!
·architecture-weekly.com·
Documenting Event-Driven Architecture with EventCatalog and David Boyne
How should we control access to user data?
How should we control access to user data?
At some point in a startup’s lifecycle, they decide that they need to be ready to go public in 18 months, and a flurry of IPO-readiness activity kicks off. This strategy focuses on a company working on IPO readiness, which has identified a gap in their internal controls for managing access to their users’ data. It’s a company that wants to meaningfully improve their security posture around user data access, but which has had a number of failed security initiatives over the years.
·lethain.com·
How should we control access to user data?
Russian Morse Code
Russian Morse Code
How does Russian Morse code compare to International Morse Code? How hard would it be to switch from one to the other?
·johndcook.com·
Russian Morse Code
Small software
Small software
In praise of the humble indie app.
·connecthv.com·
Small software
ConnectHV Blog
ConnectHV Blog
Dispatches from the Hudson Valley creative community.
·connecthv.com·
ConnectHV Blog
Extracting Remote PDFs in Postgres with pgpdf and pgsql-http
Extracting Remote PDFs in Postgres with pgpdf and pgsql-http
Are you tired of the repetitive process of downloading PDFs manually, extracting their content, and then inserting the parsed text into your PostgreSQL database? If so, you’re not alone. The traditional approach—downloading files, using external tools to extract text, and then importing it into a database—is cumbersome and time-consuming.
·tselai.com·
Extracting Remote PDFs in Postgres with pgpdf and pgsql-http
File path formats on Windows systems - .NET
File path formats on Windows systems - .NET
In this article, learn about file path formats on Windows systems, such as traditional DOS paths, DOS device paths, and universal naming convention (UNC) paths.
·learn.microsoft.com·
File path formats on Windows systems - .NET
ZeroNet - Wikipedia
ZeroNet - Wikipedia
ZeroNet is a decentralized web-like network of peer-to-peer users, created by Tamas Kocsis in 2015, programming for the network was based in Budapest, Hungary; is built in Python; and is fully open source. Instead of having an IP address, sites are identified by a public key. The private key allows the owner of a site to sign and publish changes, which propagate through the network. Sites can be accessed through an ordinary web browser when using the ZeroNet application, which acts as a local webhost for such pages. In addition to using bitcoin cryptography, ZeroNet uses trackers from the BitTorrent network to negotiate connections between peers. ZeroNet is not anonymous by default, but it supports routing traffic through the Tor network.
·en.wikipedia.org·
ZeroNet - Wikipedia
pastagang
pastagang
jam code
·pastagang.cc·
pastagang
What is Twingate? | Tailscale
What is Twingate? | Tailscale
Compare two of 2025's top Virtual Private Network (VPN) solutions: Tailscale and Twingate.
·tailscale.com·
What is Twingate? | Tailscale
Start at the Beginning
Start at the Beginning
Website visitors shouldn't have to attempt to navigate back to where they wanted to go after logging in
·lyonheart.us·
Start at the Beginning
The case for sans-io
The case for sans-io
The most popular option to decompress ZIP files from the Rust programming language is a crate simply named zip — At the time of this writing, it has 48 million downloads. It ’ s fully-featured, sup...
·fasterthanli.me·
The case for sans-io
Agents negotiating toward truth machines
Agents negotiating toward truth machines
The latest notions from the developments on human-AI partnerships (yes also DeepSeek), and thoughts triggered by lessons from the global south and blockchain reflections.
·target-is-new.ghost.io·
Agents negotiating toward truth machines
Modeling data and information in an organization
Modeling data and information in an organization
The last weeks I've been focusing a lot on the data and information models in architecture. Organizations have so much data flowing around that it's hard to effectively map it all out. That's a shame because there are some very valuable learnings to be had from that data.
·frederickvanbrabant.com·
Modeling data and information in an organization