System Architecture

System Architecture

7404 bookmarks
Custom sorting
19 random digits is not enough to uniquely identify all human beings
19 random digits is not enough to uniquely identify all human beings
Suppose that you assigned everyone an 19 digit number. What is the probability that two human beings would have the same number? It is an instance of the Birthday’s paradox. Assuming that there are 8 billion people, the probability that at least two of them end up with the same number is given by the … Continue reading 19 random digits is not enough to uniquely identify all human beings
·lemire.me·
19 random digits is not enough to uniquely identify all human beings
Internet-Scale Video Requires Its Own Kind Of Supercomputing
Internet-Scale Video Requires Its Own Kind Of Supercomputing
Video has taken over the Internet, with almost 80 percent or so of the traffic being video. Datacenters over the past several years have increasingly
·nextplatform.com·
Internet-Scale Video Requires Its Own Kind Of Supercomputing
The Crazy Eights Of Large Language Models
The Crazy Eights Of Large Language Models
We read a fairly large number of technical papers here at The Next Platform, and it is a rare thing indeed when we can recommend that everyone – or damned
·nextplatform.com·
The Crazy Eights Of Large Language Models
Flyte: An Open Source Orchestrator for ML/AI Workflows
Flyte: An Open Source Orchestrator for ML/AI Workflows
Flyte is an open source orchestration tool for managing the workflow of machine learning and AI projects. It runs on top of Kubernetes.
·thenewstack.io·
Flyte: An Open Source Orchestrator for ML/AI Workflows
Load Balancing
Load Balancing
A bottom-up, animated guide to HTTP load balancing algorithms.
·samwho.dev·
Load Balancing
Modular Errors in Rust
Modular Errors in Rust
It is thankfully common wisdom nowadays that documentation must be placed as near as possible to the code it documents, and should be fine-grained to a minimal unit of describability (the thing being documented). The practice provides numerous benefits to the codebase and project as a whole:
·sabrinajewson.org·
Modular Errors in Rust
Google Investigates a New Approach for Workload Isolation
Google Investigates a New Approach for Workload Isolation
Google's exprierimental Workload Security Rings classifies the workloads by security requirements and then isolates and enforces each class at the machine boundary.
·thenewstack.io·
Google Investigates a New Approach for Workload Isolation
The shrinking role of semaphores
The shrinking role of semaphores
The kernel's handling of concurrency has changed a lot over the years. In 2023, a kernel developer's toolkit includes tools like completions, highly optimized mutexes, and a variety of lockless algorithms. But, once upon a time, concurrency control came down to the use of simple semaphores; a discussion on a small change to the semaphore API shows just how much the role of semaphores has changed over the course of the kernel's history.
·lwn.net·
The shrinking role of semaphores
How to Automate Your Wasteful Processes
How to Automate Your Wasteful Processes
Once you have identified wasteful processes in your organization, how should you go about addressing and reducing this toil for the team?
·thenewstack.io·
How to Automate Your Wasteful Processes
Building GitHub with Ruby and Rails | The GitHub Blog
Building GitHub with Ruby and Rails | The GitHub Blog
Since the beginning, GitHub.com has been a Ruby on Rails monolith. Today, the application is nearly two million lines of code and more than 1,000 engineers collaborate on it daily. We deploy as often as 20 times a day, and nearly every week one of those deploys is a Rails upgrade. Upgrading Rails weekly Every […]
·github.blog·
Building GitHub with Ruby and Rails | The GitHub Blog
Replacing bad systems with bad systems
Replacing bad systems with bad systems
A metaphor involving parking meters. Over the years, parking meters in town have evolved into a cumbersome, awkward system. Coins are heavy and you need to have them handy, meters need to be reinfo…
·seths.blog·
Replacing bad systems with bad systems
Trillian: The Crowdsourced Knowledge Graph for AI
Trillian: The Crowdsourced Knowledge Graph for AI
Trillian is an open and crowdsourced knowledge graph backed by a vector store. Its simple API allows anyone to add and search for related concepts.
·trillian.ai·
Trillian: The Crowdsourced Knowledge Graph for AI
RISC-V In The Datacenter Is No Risky Proposition
RISC-V In The Datacenter Is No Risky Proposition
It was only a matter of time, perhaps, but the skyrocketing costs of designing chips is colliding with the ever-increasing need for performance,
·nextplatform.com·
RISC-V In The Datacenter Is No Risky Proposition
Using TLA⁺ at Work
Using TLA⁺ at Work
Designing a snapshot coordination system
·ahelwer.ca·
Using TLA⁺ at Work
Railway Plans to Simplify Infrastructure for Developers
Railway Plans to Simplify Infrastructure for Developers
Railway promises to simplify infrastructure for frontend and web developers. The company recently rewrote its command line interface in Rust.
·thenewstack.io·
Railway Plans to Simplify Infrastructure for Developers
A Platform for Kubernetes
A Platform for Kubernetes
Kubernetes community can greatly benefit from internal developer platforms to simplify its adoption and day-to-day usage.
·thenewstack.io·
A Platform for Kubernetes
Data Streaming: When Is Redpanda Better Than Apache Kafka?
Data Streaming: When Is Redpanda Better Than Apache Kafka?
The low latency, high throughput and storage needs of the cloud native era require new thinking. Redpanda can help improve performance and keep costs low as it scales.
·thenewstack.io·
Data Streaming: When Is Redpanda Better Than Apache Kafka?
Minimal vs Fully Qualified Access Requests
Minimal vs Fully Qualified Access Requests
By creating fully qualified authorization contexts from minimal requests, a policy information point reduces the burden on developers building or integrating policy enforcement points, allows for more flexible and reusable policies, and enriches authorization contexts to allow more precise access decisions.
·windley.com·
Minimal vs Fully Qualified Access Requests
Small Is Beautiful #11
Small Is Beautiful #11
Can the Small Web be as easy (or easier) to use than the Big Web? (Spoiler: Yes.)
·small-tech.org·
Small Is Beautiful #11
Meminductor: Researchers discover new circuit element
Meminductor: Researchers discover new circuit element
Dr. H. Rusty Harris, associate professor in the Department of Electrical and Computer Engineering at Texas A&M University, has identified a new circuit element known as a meminductor.
·techxplore.com·
Meminductor: Researchers discover new circuit element
Funnel 101: sharing your local developer preview with the world
Funnel 101: sharing your local developer preview with the world
Tailscale Funnel lets you share a local service with the internet. Today Xe covers how you can use this productively by sharing the development copy of an application to the world.
·tailscale.dev·
Funnel 101: sharing your local developer preview with the world