Read later
Tech Readings
- Native Distributed Databases: Problems, Challenges and Opportunities
- ATProto for distributed systems engineers
- Fallacies of distributed computing
- Notes on Distributed Systems for Young Bloods
- Making reliable distributed systems in the presence of software errors
- Kubernetes Deep Health Checks Distributed Systems Horror Stories: Part One
- The Thundering Herd Problem Distributed Systems Horror Stories: Part Two
- Lamport clocks
- Why do computers stop and what can be done about it?
- How to do distributed locking
- Distributed Hash Tables with Kademlia
- The CAP Theorem. The Bad, the Bad, & the Ugly
- An Illustrated Proof of the CAP Theorem
- CAP Twelve Years Later: How the "Rules" Have Changed
- The Heart of Unix
- Files are fraught with peril
- Quantum Cryptography Has Everyone Scrambling
- Immutability Changes Everything
- Taking a Look at Compression Algorithms
- Software Possession for Personal Use
- The top of the DNS hierarchy
- Lessons From Our 8 Years Of Kubernetes In Production — Two Major Cluster Crashes, Ditching Self-Managed, Cutting Cluster Costs, Tooling, And More
- gRPC vs REST: Understanding gRPC, OpenAPI and REST and when to use them in API design
- git rebase: what can go wrong?
- git rebase in depth
- Keycloak With Docker Compose
- Dashy - organize your self-hosted services
- Local SSL Certificates
- Split-brain (computing)
- PyPI now supports digital attestations
- Attestations: A new generation of signatures on PyPI
- Netflix’s Distributed Counter Abstraction
- Caching challenges and strategies
- Computer and Network Security by Avi Kak
- Dependency inversion principle
- Event-Driven Architecture: What You Need to Know
- How Precision Time Protocol is being deployed at Meta
- Simple Precision Time Protocol at Meta
- Open-sourcing a more precise time appliance
- It’s time to leave the leap second in the past
- Time, Clocks, and the Ordering of Events in a Distributed System
- Ports And Adapters Architecture
- Principles of Eventual Consistency
- Protecting Secrets from Computers
- Retries- An interactive study of common retry methods
- Scaling your API with rate limiters
- NSA Releases Guidance on Zero Trust Maturity Throughout the Application and Workload Pillar
- Breaking Down the NSA’s Guidance on Zero Trust Implementations for the Applications and Workloads Pillar
- Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems
Non-Tech Readings