How Shopify Manages Petabyte Scale MySQL Backup and Restore
Given the petabyte scale size and criticality of data, we need a robust and efficient backup and restore solution. We drastically reduced our Recovery Time Objective (RTO) to under 30 minutes by redesigning our tooling to use disk-based snapshots, and we want to share how it was done
Consistent Hashing: Algorithmic Tradeoffs
I have a set of keys and values. I also have some servers for a key-value store. This could be memcached, Redis, MySQL, whatever. I want to distribute the keys across the servers so I can find them again. And I want to do this without having to store a global directoy.
Data Structures Part 3: Arrays of arrays
When we created our bulk data arrays, we assumed that all objects were fixed size so that we could fit their data into a single struct and store the bulk data as just an array of such structs:
But what if we need some fields in the object that are dynamically sized?
You Cannot cURL Under Pressure
Could you turn the curl manual page into a game? This is a technical write up of the infrastructure behind this game which require a new VM per user per game.
Code to read
Push and pull git repos to/from an s3 bucket, encrypted using gpg.
You will learn how to create custom git command.
An instance of your terminal in your browser
PWA terminal powered by WebAssembly, WAPM, and Wasmer-JS
A serverless cluster computing system for the Go programming language
🐒 Resiliency toolkit for Ruby for failing fast
A high-performance color highlighter for Neovim which has no external dependencies!
Open source data dashboarding. a free alternative to expensive SaaS tools like PeriScope, Mode, Looker or ChartIO
Tools to bootstrap CAs, certificate requests, and signed certificates.
An event-driven, portable runtime for building microservices on cloud and edge
Comment system alternative to disques
an archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Its aim is to serve as the most comprehensive collection of exploits, shellcode and papers gathered through direct submissions, mailing lists, and other public sources, and present them in a freely-available and easy-to-navigate database
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this