On the critical importance of accepting and working with invalid data

Continue reading


@ayende.com | 1 year ago

Implementing a File Pager in Zig

Continue reading


@ayende.com | 1 year ago

Modern programming languages require generics

Continue reading


@ayende.com | 1 year ago

Criticizing Hare language approach for generic data structures

Continue reading


@ayende.com | 2 years ago

Looking into Odin and Zig

Continue reading


@ayende.com | 2 years ago

Cascading Retries and the Sulky Applications

Continue reading


@ayende.com | 2 years ago

Looking into Odin and Zig

Continue reading


@ayende.com | 2 years ago

Looking into Zig

Continue reading


@ayende.com | 2 years ago

Responsibility Abdication: The path to create flexible business system

Continue reading


@ayende.com | 2 years ago

Pricing Predictability with Database Engines

Continue reading


@ayende.com | 2 years ago

Sorted Integer Compression

Continue reading


@ayende.com | 2 years ago

A deep dive into database internals

Continue reading


@ayende.com | 2 years ago

Influential Computer Science Papers

Continue reading


@ayende.com | 3 years ago

Whitepaper: Couchbase vs. RavenDB Performance at Rakuten Kobo

Continue reading


@ayende.com | 3 years ago

Reading Candidates’ GitHub Profiles

Continue reading


@ayende.com | 3 years ago

Building a social media platform without going bankrupt

Continue reading


@ayende.com | 3 years ago

Building a social media platform without going bankrupt: Part I

Continue reading


@ayende.com | 3 years ago

Looking at Parler specs and their architecture

Continue reading


@ayende.com | 3 years ago

Long term effects of banning Parler

Continue reading


@ayende.com | 3 years ago

Open Source and Money: Part I

Continue reading


@ayende.com | 3 years ago

The failure of a computer you didn't even know existed

Continue reading


@ayende.com | 3 years ago

Respect your natural scaling limits

Continue reading


@ayende.com | 3 years ago

Using Machine Learning with RavenDB

Continue reading


@ayende.com | 3 years ago

Avoiding exposing identifier details to your users

Continue reading


@ayende.com | 3 years ago

Byzantine and non-Byzantine distributed systems

Continue reading


@ayende.com | 3 years ago

Avoid rolling your own leader election algorithm

Continue reading


@ayende.com | 3 years ago

Notes on RavenDB vs. PostgreSQL

Continue reading


@ayende.com | 4 years ago

Building extendible hash leaf page–Part III, optimization phase

Continue reading


@ayende.com | 4 years ago

Digging into Extendible Hashing

Continue reading


@ayende.com | 4 years ago

Voron’s Roaring Set: Part II–Implementation

Continue reading


@ayende.com | 4 years ago

Searching through text: Part I, full text search in under 200 lines of code

Continue reading


@ayende.com | 4 years ago

The Issue of Negative Zero

Continue reading


@ayende.com | 4 years ago

The Design of RavenDB’s Security

Continue reading


@ayende.com | 4 years ago

Production ready code is much more than error handling

Continue reading


@ayende.com | 5 years ago

Production ready code is much more than error handling

Continue reading


@ayende.com | 5 years ago

Making Money from Open Source Software: How We Do It?

Continue reading


@ayende.com | 5 years ago

Making Money from Open Source Software: The Dichotomy

Continue reading


@ayende.com | 5 years ago

Making Money from Open Source Software: The Problem

Continue reading


@ayende.com | 5 years ago

The security implications of self updating credentials

Continue reading


@ayende.com | 5 years ago

Using TLS in Rust: The complexity of async, macros and madness

Continue reading


@ayende.com | 5 years ago

Role of Domain Model with CQRS / Event Sourcing

Continue reading


@ayende.com | 5 years ago

Technical presentation delivery notes

Continue reading


@ayende.com | 5 years ago

Using TLS with Rust – Getting OpenSSL to Work

Continue reading


@ayende.com | 5 years ago

Using TLS with RustPart III – Will native tls do the trick?

Continue reading


@ayende.com | 5 years ago

Using TLS with Rust: Part II, Client Authentication

Continue reading


@ayende.com | 5 years ago

Using TLS with Rust: Part I

Continue reading


@ayende.com | 5 years ago

Writing my network protocol in Rust

Continue reading


@ayende.com | 5 years ago

Cost oriented programming in the cloud

Continue reading


@ayende.com | 5 years ago