1_r/devopsish

1_r/devopsish

54506 bookmarks
Custom sorting
Increasing QUIC and UDP throughput over Tailscale
Increasing QUIC and UDP throughput over Tailscale
We’re releasing a set of changes that builds on the foundation of our earlier WireGuard performance work, significantly improving UDP throughput on Linux. As with the previous work, we intend to upstream these changes to WireGuard. Our changes improve throughput for HTTP/3, QUIC, and other UDP-based applications through the use of segmentation offloads. UDP throughput over Tailscale increases 4x on bare metal Linux, and pushes past (for now) the in-kernel WireGuard implementation on that hardware. You can experience these improvements in Tailscale v1.54.
·tailscale.com·
Increasing QUIC and UDP throughput over Tailscale
Hacking ADHD - Strategies for the Modern Developer | Ledger
Hacking ADHD - Strategies for the Modern Developer | Ledger
Introduction After struggling a lot with my mental health (anxiety, depressive condition) for several years, I was diagnosed with Attention-Deficit/Hyperactivity Disorder, commonly known as ADHD, at the age of 44. This diagnosis shocked me a lot: I wasn’t a wild child, in fact, I was even a good pupil. With the help of my therapist, […]
·ledger.com·
Hacking ADHD - Strategies for the Modern Developer | Ledger
Reversing AWS IAM unique IDs
Reversing AWS IAM unique IDs
A few years ago, I wrote about determining AWS account IDs from AWS access keys, i.e. those strings that begin with AKIA or ASIA. It’s also possible to determine information from other AWS IAM unique IDs, specifically these two from the table in Amazon’s docs.
·awsteele.com·
Reversing AWS IAM unique IDs
I’ve really been liking Claude lately | Use GenAI to Uncover New Insights into Your Competitors
I’ve really been liking Claude lately | Use GenAI to Uncover New Insights into Your Competitors
Companies have a growing problem of information overload regarding markets and competitors, which often prevents the C-suite from making the best decisions available given the data at its disposal. While generative AI is often pitched as a way to create new content (information in, message out), it can work just as well — or depending on the application, even better — in reverse (message in, information out). And this counterintuitive application of generative AI is starting to enable leaders in marketing, strategy, and competitive intelligence to unearth strategically relevant insights about their competitors from documents made publicly available by those competitors. In other words, generative AI can become the watchful eye that spots useful insights in the field of competitive intelligence.
·hbr.org·
I’ve really been liking Claude lately | Use GenAI to Uncover New Insights into Your Competitors
Use of HTTPS Resource Records
Use of HTTPS Resource Records
An analysis of over 225 million domain names to determine the current use of the new HTTPS DNS Resource Records.
·netmeister.org·
Use of HTTPS Resource Records
Reaction to Alibaba's scrapping of cloud unit spin-off
Reaction to Alibaba's scrapping of cloud unit spin-off
Hong Kong-listed shares of China's Alibaba Group plunged 10% on Friday, wiping about $20 billion off its market value, after the company scrapped plans to spin off its cloud business.
·reuters.com·
Reaction to Alibaba's scrapping of cloud unit spin-off
2023 Awards
2023 Awards
2023 Awards https://www.kubernetes.dev/community/awards/2023/
·kubernetes.dev·
2023 Awards
LLM Inference On CPUs (Intel)
LLM Inference On CPUs (Intel)
A technical paper titled “Efficient LLM Inference on CPUs” was published by researchers at Intel. Abstract: “Large language models (LLMs) have demonstrated remarkable performance and tremendous potential across a wide range of tasks. However, deploying these models has been challenging due to the astronomical amount of model parameters, which requires a demand for large memory... » read more
·semiengineering.com·
LLM Inference On CPUs (Intel)
The Hidden Secrets of the Fn Key - TidBITS
The Hidden Secrets of the Fn Key - TidBITS
The Fn key has been a fixture on Apple keyboards for decades, but many Mac users lack a sense of its purpose. Adam Engst thought he was going to write a quick article listing hidden keyboard shortcuts that tap the Fn key but got dragged into documenting the history and capabilities of this unsung key.
·tidbits.com·
The Hidden Secrets of the Fn Key - TidBITS
Toward Federation and an Open Network
Toward Federation and an Open Network
One year ago, the first post on Bluesky was created. Now, we're working toward federation and a truly open network.
·blueskyweb.xyz·
Toward Federation and an Open Network