@ta9mi141.bsky.social
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
The actual bottlenecks were, and still are, code reviews, knowledge transfer through mentoring and pairing, testing, debugging, and the human overhead of coordination and communication.
LLM はコードの生成はするが,このあたりがボトルネックなのは依然として変わりない,という話
G1 の方が適したワークロードもありつつ,全体的に Generational ZGC の恩恵が大きいということか
19.10.2025 10:24 — 👍 0 🔁 0 💬 0 📌 0Instead of only trying to prevent failure at every level of the system, we had to accept that no action on our part—no matter how heroic—could prevent all failures. We had to invest in not only preventing failures, but also in failing better when they inevitably occur.
18.10.2025 12:34 — 👍 0 🔁 0 💬 0 📌 0we identified a pattern in our systems design that needed to change: we had built with the assumption that the only way to handle failure was to prevent it entirely—or to stop everything—rather than finding ways to degrade gracefully and continue delivering value to customers
18.10.2025 11:35 — 👍 0 🔁 0 💬 1 📌 0ZGC is not yet supported. We intend to address this limitation in future work.
11.10.2025 10:29 — 👍 0 🔁 0 💬 0 📌 0効果的な cache を作るためには training run でいかに production run 相当の振る舞いをさせるかがポイント.
10.10.2025 15:36 — 👍 0 🔁 0 💬 1 📌 0With the AOT cache, ... work that the JVM would usually do just-in-time when the program runs in the third step is shifted ahead-of-time to the second step, which creates the cache.
the program starts up faster in the third step because its classes are available instantly from the cache.
To create a cache takes two steps. First, run the application once, in a training run, to record its AOT configuration
Second, use the configuration to create the cache
Subsequently, in testing or production, run the application with the cache
Lay a foundation for continued improvements to startup time and also to warmup time, i.e., the time required for the HotSpot JVM to optimize an application’s code for peak performance.
10.10.2025 15:09 — 👍 0 🔁 0 💬 1 📌 0Profiles cached during training runs do not prevent additional profiling during production runs. This is critical, since an application's behavior in production can diverge from what was observed in training.
10.10.2025 15:03 — 👍 0 🔁 0 💬 1 📌 0We can improve warmup time by collecting profiles even earlier, in a training run of the application.
We extend the AOT cache, introduced by JEP 483, to collect method profiles during training runs.
Ultimately, platform engineering is about balancing developer velocity with robust governance.
21.09.2025 10:19 — 👍 0 🔁 0 💬 0 📌 0Manual checkpoints are processes that require human oversight to ensure a platform tenant's activities, such as a major deployment or new architectural design, align with compliance and governance requirements.
21.09.2025 09:55 — 👍 0 🔁 0 💬 1 📌 0A safety net is a reactive control that activates after an error or failure has already occurred. Its purpose is not to prevent the initial event, but to detect the problem, mitigate its impact, and facilitate a swift recovery.
21.09.2025 09:45 — 👍 0 🔁 0 💬 1 📌 0A guardrail doesn't consider a developer's immediate goal or speed; it only cares about preventing an action that could compromise the entire system.
21.09.2025 09:38 — 👍 0 🔁 0 💬 1 📌 0Golden paths aren’t about preventing bad behavior with a wall, but about encouraging good behavior via a well-paved, high-speed lane.
21.09.2025 09:32 — 👍 1 🔁 0 💬 1 📌 0MDBM, a memory-mapped key–value store. This design leveraged the operating system’s page cache via mmap to load database pages on demand
09.09.2025 00:41 — 👍 0 🔁 0 💬 0 📌 0Building a centralized authorization service is a serious effort.
You can also use a centralized authorization service from a third-party.
You can sidestep this headache altogether by going all-in on your central authorization service and making it the authoritative source of truth for the data.
If you want your central authorization service to return yes/no authorization results, then it will need to have access to all of the data
For centralized authorization to work you’ll have to relay a copy of that information from all of your application services to the authorization service.
データを複製する方法は数多くある.認可サービスの API を呼ぶとか,DB の operation log を使うとか.
サービスの数が増えるとデータの複製と同期は信頼できなくなりうる.