Secure by Design, Secure by Default | CISA

System Architecture
Why you should use io_uring for network I/O | Red Hat Developer
How to Get Started with Data Streaming
With Kafka and associated tools, developers can create stream-processing pipelines that transform data for real-time applications.
Where Financial Models Meet Large Language Models
If you are a Global 20,000 company and you want to build a large language model that is specifically tuned to your business, the first thing you need is a
Keep the monolith, but split the workloads | incident.io
Everybody loves a monolith, but you can hit issues as you scale. This post is about a technique – splitting your workloads – that can significantly reduce that pain, costs little, and can be applied early.
Fighting Incidents with End-to-End Event-Driven Automation
Struggling with high MTTR and too much toil? Employ a crawl, walk, run strategy toward automation for better, faster incident response.
There Is No Resilience without Chaos
Chaos engineering has emerged as an increasingly essential process to maintain reliability for applications — or in not only cloud native but any IT environment.
Feel the Power: IBM intros Direct PCIe-attach drives – Blocks and Files
IBM now provides direct, switchless access to a Power server’s flash drives, the aim being to enable more cores to access more drives with higher data access bandwidth. The Power server products are IBM’s proprietary servers and pretty much the last proprietary server CPU technology holdout against the dominant x86 processors and rising Arm and […]
Warrant | Open Source Application Authorization and Access Control
Warrant provides APIs, developer tooling, and more to help engineering teams build application authorization and access control.
Why mTLS is Not Recommended for Webhook Authentication
mTLS is not an ideal solution for webhook authentication because of its complexity, compatibility issues, and scalability concerns.
Build in-browser WordPress experiences with WordPress Playground and WebAssembly - Chrome Developers
The full WordPress powered by PHP running solely in the browser with WebAssembly
New Open Source Runtime for Web Developers Uses P2P
Socket Runtime supports app deployment on any OS, both mobile and desktop. Designed for web developers, it supports frontend libraries.
Socket Supply Co.
Write Once. Run Anywhere. Connect Everyone. P2P and local-first for Web Developers. Socket Apps
19 random digits is not enough to uniquely identify all human beings
Suppose that you assigned everyone an 19 digit number. What is the probability that two human beings would have the same number? It is an instance of the Birthday’s paradox. Assuming that there are 8 billion people, the probability that at least two of them end up with the same number is given by the … Continue reading 19 random digits is not enough to uniquely identify all human beings
Internet-Scale Video Requires Its Own Kind Of Supercomputing
Video has taken over the Internet, with almost 80 percent or so of the traffic being video. Datacenters over the past several years have increasingly
Videstra - Membrane framework
The Crazy Eights Of Large Language Models
We read a fairly large number of technical papers here at The Next Platform, and it is a rare thing indeed when we can recommend that everyone – or damned
Feature flags and authorization abstract the same concept | nicholas@web
Flyte: An Open Source Orchestrator for ML/AI Workflows
Flyte is an open source orchestration tool for managing the workflow of machine learning and AI projects. It runs on top of Kubernetes.
SudoLang: A Powerful Pseudocode Programming Language for LLMs
Pseudocode is a fantastic way to sketch programs using informal, natural language, without worrying about specific syntax. It’s like…
Authentication vs Authorization - Dan Schnau dot com
Load Balancing
A bottom-up, animated guide to HTTP load balancing algorithms.
Modular Errors in Rust
It is thankfully common wisdom nowadays that documentation must be placed as near as possible to the code it documents, and should be fine-grained to a minimal unit of describability (the thing being documented). The practice provides numerous benefits to the codebase and project as a whole:
IdempotencyPlug - idempotent POST requests
The motivations behind building IdempotencyPlug
Google Investigates a New Approach for Workload Isolation
Google's exprierimental Workload Security Rings classifies the workloads by security requirements and then isolates and enforces each class at the machine boundary.
The shrinking role of semaphores
The kernel's handling of concurrency has changed a lot over the years. In
2023, a kernel developer's toolkit includes tools like completions, highly
optimized mutexes, and a variety of lockless
algorithms. But, once upon a time, concurrency control came down to
the use of simple semaphores; a discussion on a small change to the
semaphore API shows just how much the role of semaphores has changed over
the course of the kernel's history.
How to Automate Your Wasteful Processes
Once you have identified wasteful processes in your organization, how should you go about addressing and reducing this toil for the team?
Building GitHub with Ruby and Rails | The GitHub Blog
Since the beginning, GitHub.com has been a Ruby on Rails monolith. Today, the application is nearly two million lines of code and more than 1,000 engineers collaborate on it daily. We deploy as often as 20 times a day, and nearly every week one of those deploys is a Rails upgrade. Upgrading Rails weekly Every […]
Replacing bad systems with bad systems
A metaphor involving parking meters. Over the years, parking meters in town have evolved into a cumbersome, awkward system. Coins are heavy and you need to have them handy, meters need to be reinfo…
Microsoft Semantic Kernel for AI Dev: A Chat with John Maeda
John Maeda says there is a shift in programming from syntax to semantics, due to AI. We talk to him about Microsoft's new Semantic Kernel SDK.