System Architecture

System Architecture

7437 bookmarks
Custom sorting
avaneev/prvhash: PRVHASH - Pseudo-Random-Value Hash. Hash functions, PRNG with unlimited period, randomness extractor. (Codename Gradilac/Градилак)
avaneev/prvhash: PRVHASH - Pseudo-Random-Value Hash. Hash functions, PRNG with unlimited period, randomness extractor. (Codename Gradilac/Градилак)
PRVHASH - Pseudo-Random-Value Hash. Hash functions, PRNG with unlimited period, randomness extractor. (Codename Gradilac/Градилак) - avaneev/prvhash: PRVHASH - Pseudo-Random-Value Hash. Hash functi...
·github.com·
avaneev/prvhash: PRVHASH - Pseudo-Random-Value Hash. Hash functions, PRNG with unlimited period, randomness extractor. (Codename Gradilac/Градилак)
The Anatomy of a Malicious Package
The Anatomy of a Malicious Package
What does a malicious package actually look like in practice? We'll walk through some hypothetical exercises to see how malware generally works, and what sort of functions we might expect, from relatively simple and temporary, to complex.
·blog.phylum.io·
The Anatomy of a Malicious Package
Home - Groq
Home - Groq
Uncompromised Low Latency.
·groq.com·
Home - Groq
End-to-End IoT Security: SDRs for Uncovering RF Security Vulnerabilities in SDRs - Embedded Computing Design
End-to-End IoT Security: SDRs for Uncovering RF Security Vulnerabilities in SDRs - Embedded Computing Design
In today’s wireless and 5G era, companies and individuals encounter a rising number of security threats on their IT assets. Wireless RF signals can be intercepted by anyone with low-cost radio equipment and decoded using open-source software, thus it’s imperative to assess connected designs for security vulnerabilities. This includes conducting penetration tests, jamming, replay attacks, and other methods to assess vulnerabilities in internet-of-things (IoT) RF protocols like Bluetooth, ZigBee, 6LoWPAN, Z-Wave, etc.
·embeddedcomputing.com·
End-to-End IoT Security: SDRs for Uncovering RF Security Vulnerabilities in SDRs - Embedded Computing Design
Stability AI Open-Sources Image Generation Model Stable Diffusion
Stability AI Open-Sources Image Generation Model Stable Diffusion
Stability AI released the pre-trained model weights for Stable Diffusion, a text-to-image AI model, to the general public. Given a text prompt, Stable Diffusion can generate photorealistic 512x512 pixel images depicting the scene described in the prompt.
·infoq.com·
Stability AI Open-Sources Image Generation Model Stable Diffusion
Proxying HTTP and gRPC requests in Go
Proxying HTTP and gRPC requests in Go
At Host Factor all incoming traffic passes through our proxy layer and all outgoing TCP traffic is redirected to our application proxy…
·itnext.io·
Proxying HTTP and gRPC requests in Go
Improving DevOps Performance with DORA Metrics
Improving DevOps Performance with DORA Metrics
Everyone in the software industry is in a race to become more agile. We all want to improve the performance of our software development…
·horovits.medium.com·
Improving DevOps Performance with DORA Metrics
The Amstrad CPC Portable
The Amstrad CPC Portable
A beautiful reimagining of The Amstrad Colour Personal Computer. Michael Wessel put a lot of care and detail into making the worlds first battery-powered all-in-one portable Amstrad CPC! From Hacka…
·blog.adafruit.com·
The Amstrad CPC Portable
Implement Fine-Grained Security, or Get Left Behind
Implement Fine-Grained Security, or Get Left Behind
Authorization has to happen close to the application, because it’s in the critical path of every application request. But fine-grained security requires real-time access to user attributes and resource relationships.
·thenewstack.io·
Implement Fine-Grained Security, or Get Left Behind
Authorization Challenges in a Multitenant System
Authorization Challenges in a Multitenant System
Multitenancy poses challenges around authorization and privacy, so it's important to understand these before you start building your system.
·thenewstack.io·
Authorization Challenges in a Multitenant System
Announcing the new guide to Android app modularization
Announcing the new guide to Android app modularization
Posted by Miłosz Moczkowski, Developer Relations Engineer, Android As your app grows in size and complexity, it becomes increasingly d...
·android-developers.googleblog.com·
Announcing the new guide to Android app modularization
Live sessions in action
Live sessions in action
A closer look at live_session and different use cases
·fly.io·
Live sessions in action
Off Grid Internet Use Cases
Off Grid Internet Use Cases
Expanding the uses of an autonomous network, and offering some ideas on the ways that autonomous and community controlled networking can lead to change.
·anarchosolarpunk.substack.com·
Off Grid Internet Use Cases