System Architecture

System Architecture

7363 bookmarks
Custom sorting
Why HTTP/3 uses UDP protocol under QUIC instead of TCP?
Why HTTP/3 uses UDP protocol under QUIC instead of TCP?
HTTP/3's use of UDP provides several advantages over TCP, including faster connections, better performance on high-latency networks, and improved security.
·gosink.in·
Why HTTP/3 uses UDP protocol under QUIC instead of TCP?
Bloom Filters Explained
Bloom Filters Explained
probabilistic data structure to check membership of an item in constant time and space
·systemdesign.one·
Bloom Filters Explained
Quotes from Programming Elixir
Quotes from Programming Elixir
Programming Elixir ≥1.6: Functional | Concurrent | Pragmatic | Fun by Dave Thomas. Some of Dave’s words I found particularly interesting, insightful, or inspiring. “But mostly, I want you to have fun.” “…you can think about programming in a different way.” “You no longer have to think too hard about protecting your data consistency in a multithreaded environment.” “I don’t want to hide data. I want to transform it.”
·rgacote.github.io·
Quotes from Programming Elixir
Software design that lasts
Software design that lasts
A mindset shift to curiously atomically correct, resulting in software that fosters innovation and opportunity
·medium.com·
Software design that lasts
URL Shortening System Design
URL Shortening System Design
1. create a unique short URL 2. encode the short URL 3. persist short URL 4. redirect the short URL to a long URL
·systemdesign.one·
URL Shortening System Design
3 Steps to Unlock the Power of Behavioral Data
3 Steps to Unlock the Power of Behavioral Data
Behavioral data describes what customers do minute by minute, second by second. And, because it’s granular, contextual, and explanatory, it provides the strongest predictor of customer intent.
·thenewstack.io·
3 Steps to Unlock the Power of Behavioral Data
Ambient Mesh: Sidestepping the Sidecar
Ambient Mesh: Sidestepping the Sidecar
Istio ambient mesh is a mode that leverages a mesh data plane instead of deploying sidecar proxies, without sacrificing zero trust security.
·thenewstack.io·
Ambient Mesh: Sidestepping the Sidecar
What I Dislike About GAS
What I Dislike About GAS
I often get to argument with various linux guys about AT&T versus Intel syntax. There are many things I dislike on AT&T syntax, so I decided to write them all down in this article.
·x86asm.net·
What I Dislike About GAS
New Recipes for 3rd Party Cookies
New Recipes for 3rd Party Cookies
For privacy reasons, the web platform is moving away from supporting 3rd-party cookies, first with lockdowns, and eventually with removal of support in late 2023 the second half of 2024. Background…
·textslashplain.com·
New Recipes for 3rd Party Cookies
Writing a simple Lisp interpreter in Rust
Writing a simple Lisp interpreter in Rust
Lisp is a family of multi-paradigm programming languages (functional, procedural, reflective, …), which can be similar to Lambda Calculus…
·david-delassus.medium.com·
Writing a simple Lisp interpreter in Rust
Inside NASA’s big plan to bring the internet to the moon
Inside NASA’s big plan to bring the internet to the moon
NASA is planning to build a number of infrastructure on the moon, including a human habitat, a new space station—and a web service that can connect it all.
·fastcompany.com·
Inside NASA’s big plan to bring the internet to the moon
Red-black trees for BPF programs
Red-black trees for BPF programs
Most of the kernel's code is written in C and intended to be run directly on the underlying hardware. That situation is changing in a few ways, though; one of those is the ability to write kernel code for the BPF virtual machine. The 6.3 kernel release will include a new API making the red-black tree data structure available to BPF programs. Beyond being an interesting feature in its own right, this new API shows how BPF is bringing a different approach to kernel programming — and to the C language in general.
·lwn.net·
Red-black trees for BPF programs
Make your security policy auditable
Make your security policy auditable
Last week, I wrote about putting the right feature at the right place. I used rate limiting as an example, moving it from a library inside the application to the API Gateway. Today, I’ll use another example: authentication and authorization. Securing a Spring Boot application I’ll keep using Spring Boot in the following because I’m familiar with it. The Spring Boot application offers a REST endpoint to check employees' salaries. The specific use case is taken from the Open
·blog.frankel.ch·
Make your security policy auditable
Python's Quest for Simplicity
Python's Quest for Simplicity
Today I want to speak about – Python’s Quest for Simplicity. Specifically around Python tooling, where we will look at the past, present, and future of a typical Python project. Past First, let's step back in time (a few years) and look at a traditional Python project ... This looks pretty
·packetcoders.io·
Python's Quest for Simplicity
The Open Closed Principle and Planned Extension Points
The Open Closed Principle and Planned Extension Points
The Open-Closed Principle can be a challenging concept to grasp, but I’ve found it to be easier to understand when utilizing another…
·linkedrecords.com·
The Open Closed Principle and Planned Extension Points
What Is Microservices Architecture?
What Is Microservices Architecture?
Microservices architecture is game changing, allowing development teams to work independently and at cloud native scale.
·thenewstack.io·
What Is Microservices Architecture?