System Architecture

System Architecture

7363 bookmarks
Custom sorting
LearnWardleyMapping.com | Learn Simon Wardley's approach to strategy in business.
LearnWardleyMapping.com | Learn Simon Wardley's approach to strategy in business.
We make better decisions when we understand who our work benefits, what those benefits are, and the system of capabilities that comes together to make it all happen. Though we are entangled with a vast global market that we cannot fully know, we can know more than we know now. That’s what Wardley Ma
·learnwardleymapping.com·
LearnWardleyMapping.com | Learn Simon Wardley's approach to strategy in business.
Fork our open source onboarding program
Fork our open source onboarding program
The open source software team at G-Research is helping establish an easier on-ramp for getting started in open source.
·opensource.com·
Fork our open source onboarding program
Test Automation Tools Unite!
Test Automation Tools Unite!
With Container Executors, you can quickly automate new tests that are not supported by default on Testkube and make them part of your development life cycle.
·thenewstack.io·
Test Automation Tools Unite!
Passwordless deployments to the cloud | The GitHub Blog
Passwordless deployments to the cloud | The GitHub Blog
Discovering passwords in our codebase is probably one of our worst fears. But what if you didn’t need passwords at all, and could deploy to your cloud provider another way? In this post, we explore how you can use OpenID Connect to trust your cloud provider, enabling you to deploy easily, securely and safely, while minimizing the operational overhead associated with secrets (for example, key rotations).
·github.blog·
Passwordless deployments to the cloud | The GitHub Blog
5 Ways to Improve Your Web Application and API Security
5 Ways to Improve Your Web Application and API Security
Implementing strong security measures will not only stop attackers, but help you stay informed about current threats while protecting your organization.
·thenewstack.io·
5 Ways to Improve Your Web Application and API Security
Making It Easier To Break The SONiC Barrier For Networking
Making It Easier To Break The SONiC Barrier For Networking
Thanks to the ubiquity of the X86 server platform, the Kubernetes container controller, and the KVM server virtualization hypervisor, it is relatively
·nextplatform.com·
Making It Easier To Break The SONiC Barrier For Networking
8.1. Numeric Types
8.1. Numeric Types
8.1. Numeric Types 8.1.1. Integer Types 8.1.2. Arbitrary Precision Numbers 8.1.3. Floating-Point Types 8.1.4. Serial Types Numeric types consist of two-, …
·postgresql.org·
8.1. Numeric Types
ULID Identifiers and ULID Tools Website
ULID Identifiers and ULID Tools Website
Historically, when I wanted to store data in a database, I (or the project/team I was on) used an incrementing integer to uniquely identify each row (e.g. the SERIAL type in PostgreSQL).
·pgrs.net·
ULID Identifiers and ULID Tools Website
Navigate your way to production bliss with Caretta
Navigate your way to production bliss with Caretta
Get to know Caretta - a lightweight, standalone tool that instantly creates a visual network map of the services running in your cluster. Caretta leverages eBPF to efficiently map service network interactions in a K8s cluster, and Grafana to query & visualize the collected data.
·groundcover.com·
Navigate your way to production bliss with Caretta
Valid8.com Simulators, Emulators, Network Conformance Testing Tools
Valid8.com Simulators, Emulators, Network Conformance Testing Tools
Mobile,fixed network testing. Load,conformance,emulation,feature,3GPP standards test. 5G,4G/LTE,3G/UMTS,IoT,IMS Core,VoIP,SIP,radius,diameter,sctp,tcp,udp,P25 ISSI/CSSI,MCX,mission critical communications.
·valid8.com·
Valid8.com Simulators, Emulators, Network Conformance Testing Tools
Grokking RISC-V Vector Processing
Grokking RISC-V Vector Processing
While the basic idea of vector processing is simple, the details can get complex. The purpose of this story is to explain the fundamental idea of vector processing and how that has been implemented…
·itnext.io·
Grokking RISC-V Vector Processing
What Is Multi-Access Edge Computing?
What Is Multi-Access Edge Computing?
Multi-access edge computing helps to move traffic computation from central cloud to more of an edge environment. Learn more about MEC.
·thenewstack.io·
What Is Multi-Access Edge Computing?
You’re Wasting Your Time with Incident Management
You’re Wasting Your Time with Incident Management
What keeps your systems running? People do. No matter how sophisticated your technology, it will only succeed with a social system designed to support it effectively.
·thenewstack.io·
You’re Wasting Your Time with Incident Management
The IO monad
The IO monad
The IO container forms a monad. An article for object-oriented programmers.
·blog.ploeh.dk·
The IO monad