When Imperfect Systems are Good, Actually: Bluesky’s Lossy Timelines
By examining the limits of reasonable user behavior and embracing imperfection for users who go beyond it, we can continue to provide service that meets the expectations of users without sacrificing scalability of the system.
Documenting Event-Driven Architecture with EventCatalog and David Boyne
If you're wondering on how to document Event-Driven Architecture, or you don't know that you should, I have something for you. We discussed with David Boyne, why data governance practices and documenting is essential on building maintainable and evolvable systems. David also showed us also how EventCatalog can help in that. Watch this hands-on webinar to learn more!
At some point in a startup’s lifecycle, they decide that they
need to be ready to go public in 18 months, and a flurry of IPO-readiness
activity kicks off.
This strategy focuses on a company working on IPO readiness,
which has identified a gap in their internal controls for managing
access to their users’ data. It’s a company that wants to meaningfully
improve their security posture around user data access, but which has
had a number of failed security initiatives over the years.
Real-time data synchronization principles - Build Real-Time Web Apps with Meteor.js Data Sync
Realtime data synchronization in Meteor.js relies on three core mechanisms: Pub/Sub Model: Server publishes data subsets, clients subscribe to specific dat...
Extracting Remote PDFs in Postgres with pgpdf and pgsql-http
Are you tired of the repetitive process of downloading PDFs manually, extracting their content, and then inserting the parsed text into your PostgreSQL database? If so, you’re not alone. The traditional approach—downloading files, using external tools to extract text, and then importing it into a database—is cumbersome and time-consuming.
In this article, learn about file path formats on Windows systems, such as traditional DOS paths, DOS device paths, and universal naming convention (UNC) paths.
ZeroNet is a decentralized web-like network of peer-to-peer users, created by Tamas Kocsis in 2015, programming for the network was based in Budapest, Hungary; is built in Python; and is fully open source. Instead of having an IP address, sites are identified by a public key. The private key allows the owner of a site to sign and publish changes, which propagate through the network. Sites can be accessed through an ordinary web browser when using the ZeroNet application, which acts as a local webhost for such pages. In addition to using bitcoin cryptography, ZeroNet uses trackers from the BitTorrent network to negotiate connections between peers. ZeroNet is not anonymous by default, but it supports routing traffic through the Tor network.
The most popular option to decompress ZIP files from the Rust programming language is a crate simply named zip — At the time of this writing, it has 48 million downloads. It ’ s fully-featured, sup...
The latest notions from the developments on human-AI partnerships (yes also DeepSeek), and thoughts triggered by lessons from the global south and blockchain reflections.
The last weeks I've been focusing a lot on the data and information models in architecture. Organizations have so much data flowing around that it's hard to effectively map it all out. That's a shame because there are some very valuable learnings to be had from that data.