System Architecture

System Architecture

7363 bookmarks
Custom sorting
Bringing the best of Chrome to Android developers and users
Bringing the best of Chrome to Android developers and users
We’re announcing new features to Chrome Custom Tabs to give users the best of Chrome, and enable true multitasking between your app and the web.
·android-developers.googleblog.com·
Bringing the best of Chrome to Android developers and users
APIs explained in layman terms
APIs explained in layman terms
What is API ? What is Client-Server architecture ? What are the uses of APIs ?
·engineeringatscale.substack.com·
APIs explained in layman terms
The Ultimate Guide To Software Architecture Documentation
The Ultimate Guide To Software Architecture Documentation
This guide shows you how to write, structure, visualize and manage software architecture documentation in a lean way using appropriate documentation tools.
·workingsoftware.dev·
The Ultimate Guide To Software Architecture Documentation
GNUnet
GNUnet
GNU's framework for secure p2p networking
·gnunet.org·
GNUnet
Declarative Shadow DOM
Declarative Shadow DOM
We’re pleased to announce that support for the declarative shadow DOM API has been added and enabled by default in Safari Technology Preview 162.
·webkit.org·
Declarative Shadow DOM
A proposed threat model for confidential computing
A proposed threat model for confidential computing
The field of confidential computing is still in its infancy, to the point where it lacks a clear, agreed, and established problem description. Elena Reshetova and Andi Kleen from Intel recently started the conversation by sharing their view of a potential threat model in the form of this document, which is specific to the Intel Trust Domain Extension (TDX) on Linux, but which is intended to be applicable to other confidential-computing solutions as well. The resulting conversation showed that there is some ground to be covered to achieve a consensus on the model in the community.
·lwn.net·
A proposed threat model for confidential computing
Scaling Media Machine Learning at Netflix
Scaling Media Machine Learning at Netflix
We tackle some of the unique challenges of scaling multimodal machine learning models that operate on media assets (video, audio, and text).
·netflixtechblog.com·
Scaling Media Machine Learning at Netflix
HTML Tips
HTML Tips
In this article I’ll share some tips and advice about HTML.
·markodenic.com·
HTML Tips
Istio Architecture for Kubernetes: The Good, the Bad & the Ugly
Istio Architecture for Kubernetes: The Good, the Bad & the Ugly
Find out what Istio is, how the Istio architecture works, which benefits Istio offers to Kubernetes and what to watch out for when getting started with Istio virtual services in a Kubernetes cluster.
·groundcover.com·
Istio Architecture for Kubernetes: The Good, the Bad & the Ugly
Switching Techniques In Computer Networks - XALGORD
Switching Techniques In Computer Networks - XALGORD
Explore the various switching techniques used in computer networks including circuit switching, packet switching, flow control, and error control.
·xalgord.in·
Switching Techniques In Computer Networks - XALGORD
API First: The New Way of Developing Software
API First: The New Way of Developing Software
Nowadays, the focus of new software should be on software APIs. This requires the developers and architects to rethink their perspectives
·betterprogramming.pub·
API First: The New Way of Developing Software
Everything You Know About Latency Is Wrong
Everything You Know About Latency Is Wrong
Okay, maybe not everything you know about latency is wrong. But now that I have your attention, we can talk about why the tools and methodologies you use to measure and reason about latency are lik…
·bravenewgeek.com·
Everything You Know About Latency Is Wrong
The extensible scheduler class
The extensible scheduler class
It was only a matter of time before somebody tried to bring BPF to the kernel's CPU scheduler. At the end of January, Tejun Heo posted the second revision of a 30-part patch series, co-written with David Vernet, Josh Don, and Barret Rhoden, that does just that. There are clearly interesting things that could be done by deferring scheduling decisions to a BPF program, but it may take some work to sell this idea to the development community as a whole.
·lwn.net·
The extensible scheduler class
Identity Distribution Is Essential for Modern API Security
Identity Distribution Is Essential for Modern API Security
It ensures that in the complex mesh of services comprising your API, every party handles requests securely and performs informed authorization decisions.
·thenewstack.io·
Identity Distribution Is Essential for Modern API Security
Using ChatGTP to convert human knowledge into machine actionable formats
Using ChatGTP to convert human knowledge into machine actionable formats
Human knowledge has naturally for centuries been captured in human friendly formats such as books, intended to be consumed by, you guessed it, humans. But our world has changed dramatically and we now live in a space where this needs to be shared with computers. Machine driven processing, learning, or intelligence requires access to human knowledge in digital formats. We have more or less completed the transition from paper into formats such a PDF, Word, Excel, HTML, but these are unstructured and not easily consumable or understandable by software. We need to take this one step further and transition into machine friendly JSON, XML, or RDF formats, whose structured can be well described by standard specifications, schemas, and models. This is often perceived as a monumental task, but can AIs such a ChatGTP help?
·apievangelist.com·
Using ChatGTP to convert human knowledge into machine actionable formats