Links

Friday 2024-11-01 Assorted Links
Assorted Links links
Published: 2024-11-01
Friday 2024-11-01 Assorted Links

Assorted links for Friday, November 1:

  1. AI Flame Graphs
  2. OpenZFS deduplication is good now and you shouldn’t use it
  3. Apache OpenDAL: Open Data Access Layer: Access data freely
  4. Embeddings are underrated

    Embeddings aren’t exactly new, but they have become much more widely accessible in the last couple years. What embeddings offer to technical writers is the ability to discover connections between texts at previously impossible scales.

  5. How To Fail at Microservices
Thursday 2024-10-31 Assorted Links
Assorted Links links
Published: 2024-10-31
Thursday 2024-10-31 Assorted Links

Assorted links for Thursday, October 31:

  1. The Future of APIs: Lessons in Security, Composability, AI
  2. How Apollo Makes LLMs More Reliable with GraphQL

    GraphQL’s structured query language proves to be an ideal match for AI tools, offering more reliable and focused results compared to broader LLM applications.

  3. How useful is the hint passed to the std::unordered_… collections?: An unsorted followup on Speeding up the insertion of a sorted (or mostly-sorted) key list into a std::map or other ordered associative container
  4. What is a Vector Database & How Does it Work? Use Cases + Examples
  5. What is Retrieval-Augmented Generation (RAG)?
Wednesday 2024-10-30 Assorted Links
Assorted Links links
Published: 2024-10-30
Wednesday 2024-10-30 Assorted Links

Assorted links for Wednesday, October 30:

  1. Finding the Right Data Architecture for RAG Pipelines

    Event streaming is ideal for RAG pipelines that feed generative AI applications the contextual data they need to produce accurate, timely results.

  2. How to Run Databases on Kubernetes: An 8-Step Guide
  3. AI Code Assistants Are Moving Beyond Auto-Complete: Here’s What’s Next
  4. Rustls Outperforms OpenSSL and BoringSSL: Is there something intrinsic to Rust, or is this an artifact of more time spent on optimization?
  5. What is zero trust authorization?: This doesn’t seem novel to me – it seems obvious and is how I’ve architected software for 15+ years.

    Never trust, always verify: The ZTA model presumes that no entity—be it a user, device, or software—warrants automatic confidence, irrespective of their physical position or historical clearance levels. Each request for entry must undergo scrutiny.