Stupid SMP Tricks: A Review of Locking Engineering Principles and Hierarchy
Daniel Vetter put together a pair of intriguing blog posts entitled Locking Engineering Principles and Locking Engineering Hierarchy . These appear to be an attempt to establish a set of GPU-wide or perhaps even driver-tree-wide concurrency coding conventions. Which would normally be none of my…
Zero Trust Network Security with Identity-Aware Proxies
Implementing Zero Trust is not an easy task for enterprise IT. Some of the challenges include the sprawl of user identities, the proliferation of internal applications, reliance on third-party SaaS applications, and the rise of hybrid, multi-cloud, and edge architectures.
Teleport allows engineers and security professionals to unify access for SSH servers, Kubernetes clusters, web applications, and databases across all environments.
eBPF or Not, Sidecars are the Future of the Service Mesh
eBPF and sidecars are not an either-or choice, and the assertion that eBPF needs to replace sidecars is a marketing construct, not an actual requirement.
A cybersecurity firm says it has intercepted a large, unique stolen data set containing the names, addresses, email addresses, phone numbers, Social Security Numbers and dates of birth on nearly 23 million Americans. The firm's analysis of the data suggests…
In this talk, Dave Wright, Chief Innovation Officer of ServiceNow, talks about how low-code is accelerating organizations’ AI journeys and is expanding
We live in a 64-bit world, to the point that many distributors want to stop
supporting 32-bit systems at all. However, lurking within our 64-bit
kernels is a subsystem that has not really managed to move past 32-bit
addresses. The quick merge-window failure of an attempt to use
64-bit addresses in the I/O memory-management unit (IOMMU) subsystem shows
how hard it can be to leave all of one's 32-bit history behind.
We hear about electric vehicles being the future, but for that to happen, people eventually need to be able to drive long distances without getting stranded. For Bloomberg Green, Kyle Stock and Jer…
Service binding and parameter specification via the DNS (DNS SVCB and HTTPS RRs)
This document specifies the "SVCB" and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration and keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP [HTTP]. By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy. TO BE REMOVED: This document is being collaborated on in Github at: https://github.com/MikeBishop/dns-alt-svc (https://github.com/MikeBishop/dns-alt-svc). The most recent working version of the document, open issues, etc. should all be available there. The authors (gratefully) accept pull requests.
Unlocking complex problems by working with domain experts - UXM
Working with domain experts is an important part of product design, yet it’s rarely covered by design courses where the focus tends to be on working with users. Find out when you should be working with domain experts, how to go about doing this and some hints and tips to ensure that you get the most out of their expertise.