One chip transmits the entire internet's traffic in a second | Digital Trends
Researchers have made a huge breakthrough in data transmission via fiber optics by using a single computer chip to transfer 1.84 petabits of data per second
Why we're excited about the Sigstore general availability | The GitHub Blog
The Sigstore GA means you can protect your software supply chain today with GitHub Actions, and will power new npm security capabilities in the near future.
This article introduces the first release of ‘Lash#Cat9’, a different kind of command-line shell. A big change is that it is communicating with the display server directly, instead of b…
This article continues the long-lost series on how to migrate away from terminal protocols as the main building block for command-line and text-dominant user interfaces. The previous ones (Chasing …
In this post, I’ll show you why 99% of Javascript code are less readable than they should be thanks to developers refusing to communicate their intention.
const the world Before ES6, there was no way to declare constants so people used to do this:
var PI = 3.14; Now when you get fired, your successor will read this code and figure out that PI should never be reassigned.
But as from ES6, everthing is a constant:
Haskell may not be a language in the same way that French, Swahili, or Quechua are languages, but language both spoken and coded regardless have much in common. However, traditional languages are much better adapted for speech than they are to writing; after all, we humans have been speaking for far longer than we have been writing. Language has been shaped enormously by what is and is not easy to convey with the sounds our mouths make, and text is at best a very lossy technique for recording those sounds, even if the content conveyed by tone, cadence, and emotion is largely lost.
Many offices and public settings are putting up clear plexiglas barriers to insulate staff from the spread of disease. While we can easily see through these partitions, it ends up creating a lot of…
IBM builds Diamondback tape library for enterprise and cloud hyperscalers – Blocks and Files
Big Blue is active afresh in the archive-storing tape library business, with its Diamondback product for web-scale enterprises and hyperscalers, claimed to be the industry’s densest library. IBM says it has 1.8x more petabytes per square foot compared to competitor tape storage and is specifically targeted at Google, Microsoft, AWS and Meta (Facebook). We’re told they […]
Caliptra: Building Cloud Security from the Chip up
The Open Compute Project (OCP), which brings open source methods and collaboration to the data center, has introduced Caliptra, an open specification for a silicon Root-of-Trust (ROT).
All memory accesses in a BPF program are
statically checked for safety using the
verifier, which analyzes the program in its
entirety before allowing it to run. While this allows BPF programs to
safely run in kernel space, it restricts how that program is able to use
pointers. Until recently, one such constraint was that the size of a memory
region referenced by a pointer in a BPF program must be statically known
when a BPF program is loaded. A recent
patch set by Joanne Koong enhances BPF to support loading programs with
pointers to dynamically sized memory regions.
I hear it all the time from chart purists. “I love the streamgraph!” and “Word clouds are the best!” and “I wish there was an easy way to combine a streamgraph and wor…
Why an architecture with three Availability Zones is better than the one with two Availability Zones?
A couple of months back a customer asked why we are proposing a three Availability Zone (AZ in short) architecture instead of two. Their main point was which failure modes 3 AZs guard against that …