Arc Notes Weekly #78: Forests
This week, dive into the fascinating world of CPU optimization with value speculation, discover how to save milliseconds on AWS pod startups and more.
This week, dive into the fascinating world of CPU optimization with value speculation, discover how to save milliseconds on AWS pod startups, and explore Netflix's innovative approach to maintaining reliability during high-traffic events.
Enjoy this week's round-up!
— Mahdi Yusuf (@myusuf3) or LinkedIn
👋🏾 You are reading Architecture Notes - Your Sunday newsletter, which curates best system design and architecture news from around the web. We would appreciate you sharing it with like-minded people.
Articles
Beating the L1 cache with value speculation
In a fascinating deep dive into CPU optimization, this post explores how value speculation can significantly boost the performance of tight loops by leveraging CPU branch predictors. The trick allows the CPU to execute more instructions in parallel by guessing values and thereby removing data dependencies that cause bottlenecks.
How we saved 300ms from every AWS Pod Startup with a single Grafana Loki Query
Checkly, managed to shave off 300ms from every AWS pod startup, translating into significant cost savings of about $5.5k per month. The journey to this optimization took us through various stages of performance monitoring and code adjustments.
Enhancing Netflix Reliability with Service-Level Prioritized Load Shedding
Netflix continues to push the boundaries of reliability with the introduction of service-level prioritized load shedding. The strategy ensures that critical user-initiated requests are prioritized over less critical pre-fetch requests, enhancing user experience and system resilience.
Using S3 as a container registry
Adolfo OchagavÃa explores the innovative concept of using Amazon S3 as a container registry, offering a unique perspective on optimizing container image storage and retrieval.
8 versions of UUID and when to use them
Nicole dives into the world of UUIDs, explaining the eight different versions and their specific use cases. Here's a quick guide to help you choose the right UUID version for your needs. They also touch on the deprecated and specialized versions, highlighting that v7 should be used over v1 and v6 when possible, and v2 is reserved for specific, often secretive, security uses.
Reverse Engineering TicketMaster's Rotating Barcodes
In this in-depth and eye-opening article, Conduition takes us through the process of reverse engineering TicketMaster's SafeTix, a system designed to thwart ticket fraud by using rotating barcodes.
Projects
turbopuffer
In a world where data is growing exponentially, the cost and complexity of search engines have become significant barriers to innovation. Enter **turbopuffer**, a groundbreaking vector database designed to harness the power of object storage, enabling fast, cost-effective searches on massive datasets.
PySkyWiFi: completely free, unbelievably stupid wi-fi on long-haul flights
Robert shares his experience of using his JetStreamers Diamond Altitude account to access the entire internet. Through a series of prototypes, he develops PySkyWiFi, a tool that uses airmiles account fields to tunnel HTTP requests and responses, effectively bypassing the plane's firewall. From instant messaging to live stock prices and sports scores, Robert's journey is both entertaining and enlightening.