Releasing Systrap - A high-performance gVisor platform
System Architecture
How Browsers Work: Everything Developers Need To Know
I interviewed dozens of developers over 20 years as a CTO. Here’s everything developers need to know about Browsers & the Internet.
Instruction-tune models using your own data with txtinstruct
Generate datasets and train instruction-following models
A Beginner’s Guide to Strategy Design Pattern
A Step-by-Step Guide to Using the Strategy Design Pattern in Object-Oriented Programming for Flexible and Reusable Code
What Is a URL
Dangers of inconsistent parsing of URLs
IPv6 In Real Life
I have built quite the reputation as an IPv6 contrarian over the years, particularly as I yearly criticize FOSDEM for describing their dual-stack network as a “legacy” network. As I kee…
Decoded: Image Optimization on the Web
A peak into the magic behind image optimization on the web
EnTT and ImGui, or how to reconcile ECS and GUIs?
ECS and GUIs are not trivial to mix, in this article I’ll take inspiration from React to make it nicer.
Distributed Counter System Design
CRDT-based distributed counter that is eventually consistent
Tag Systems
I’ve tried to write a blog post on tag systems for years now. Literally years, I think I first started drafting it out in 2018 or so? The problem is that...
Under Linux, libSegFault and addr2line are underrated
Many modern programming languages like Java produce useful error messages when they fail. Some indicate where in the program (e.g., down to the line of source code) the failure occurred. Slowly, the C++ language is moving in this direction. A particularly nasty problem in C and C++ are segmentation faults: they occur when you are … Continue reading Under Linux, libSegFault and addr2line are underrated
Achieving an Undergraduate Level Understanding of Graph Theory
Ultralearning project to learn the equivalent of an undergraduate maths of computer science student understanding of graph theory.
Paris Is Drowning: GCP's Region Failure in Age of Operational Resilience
The time is coming, and maybe sooner than we think, when regulators will require a standardized approach to resilience in the name of public good.
Bobsled Offers Platform-Neutral Data Sharing Service
Bobsled offers a cross-cloud data sharing service and announces a $25M Series A funding round, led by Greycroft and Madrona, to build it out.
The Pure Unification Of Block And File Storage
Companies have been working for years to pull together block, file, and object storage under a single umbrella, giving enterprises that are at times
Authentication Risks in Modern Apps — What You Need to Know
Mitigating security issues in microservices and APIs requires putting strong authentication mechanisms in place.
How to Decide Between a Layer 2 or Layer 3 Network
Layer 2 Data Link connectivity provides low latency while Layer 3 Network Link offers greater scalability. Which is the right one for your workloads? Nokia has some answers.
From Centralized to Decentralized Identity: Preparing for Web5
A look at what decentralized identity is and how companies should prepare for the change it will usher in.
Introduction to HTTP Multipart
Why use it? How does it work?
Google Authenticator finally syncs one-time codes in the cloud | Engadget
Google Authenticator now syncs one-time codes with your account, so you're not stuck if you lose your device..
The Mathematics of Types
Programming isn't about mindlessly typing away on a keyboard. There is an aesthetic quality that comes with approaching a problem.
Assessing the Usability of a User Interface Standard
This paper by Henrik Thovtrup and Jakob Nielsen illustrates how user interface standards can be hard to use for developers. Two experiments demonstrate that compliance with standards is limited in both laboratory and corporate settings.
ibmsj2703E.pdf
IBM Documentation
IBM Documentation.
IBM Common User Access - Wikipedia
IBM Documentation
IBM Documentation.
The Easiest Way to Deploy Your App
Connect your GitHub repo or choose a starter and deploy. See your app live in minutes.
Confessions of a Socialist Entrepreneur - Peter Barnes
The Washington Monthly, October 1983 SEVEN YEARS AGO, at the age of 34, I decided to become a socialist entrepreneur. It seemed like a logical calling to pursue. As a muckraking journalist, I’d flung my share of arrows at the big corporations, although I inwardly feared they were invincible because no one else could deliver... Read more...
Entry 1: Algorithmic Identities
Who are you, or rather, who does the algorithm think you are? If we form our identities by the information we receive, it is uncertain how much of who we are is constituted by an algorithm. Do algorithms determine what we find meaningful?
Selecting the Best Authorization for Your API Integrations
API calls require authorization. How do you select the best authorization mechanism? This post lists the different authorization options and answers which mechanism is the best!