System Architecture

System Architecture

7363 bookmarks
Custom sorting
User-Agent header - Wikipedia
User-Agent header - Wikipedia
In computing, the User-Agent header is an HTTP header intended to identify the user agent responsible for making a given HTTP request. Whereas the character sequence User-Agent comprises the name of the header itself, the header value that a given user agent uses to identify itself is colloquially known as its user agent string. The user agent for the operator of a computer used to access the Web has encoded within the rules that govern its behavior the knowledge of how to negotiate its half of a request-response transaction; the user agent thus plays the role of the client in a client–server system. Often considered useful in networks is the ability to identify and distinguish the software facilitating a network session. For this reason, the User-Agent HTTP header exists to identify the client software to the responding server.
·en.wikipedia.org·
User-Agent header - Wikipedia
“Tor bridges,” a way to keep using Tor in countries that block it | RSF Resource for Journalists' Safety
“Tor bridges,” a way to keep using Tor in countries that block it | RSF Resource for Journalists' Safety
In highly-censored regimes, circumvention tools like Tor — a browsing system which provides anonymity and unrestricted internet access — are often targeted by censors. In this article, Reporters Without Borders (RSF) introduces Tor bridges and explains how this technology can be used by journalists to access Tor. After blocking websites…
·safety.rsf.org·
“Tor bridges,” a way to keep using Tor in countries that block it | RSF Resource for Journalists' Safety
Orca
Orca
The Orca initiative aims to produce a unified platform and set of APIs to develop, distribute and run sandboxed graphical applications on a variety of operating systems.
·orca-app.dev·
Orca
How Amazon Lambda Works 🔥
How Amazon Lambda Works 🔥
#55: Break Into Amazon Engineering (6 Minutes)
·newsletter.systemdesign.one·
How Amazon Lambda Works 🔥
First Draft of a Report on the EDVAC - Wikipedia
First Draft of a Report on the EDVAC - Wikipedia
The First Draft of a Report on the EDVAC (commonly shortened to First Draft) is an incomplete 101-page document written by John von Neumann and distributed on June 30, 1945 by Herman Goldstine, security officer on the classified ENIAC project. It contains the first published description of the logical design of a computer using the stored-program concept, which has come to be known as the von Neumann architecture; the name has become controversial due to von Neumann's failure to name other contributors.
·en.m.wikipedia.org·
First Draft of a Report on the EDVAC - Wikipedia
eBPF Security Power and Shortfalls
eBPF Security Power and Shortfalls
A proper security provider that makes heavy use of eBPF will also build on eBPF’s functionalities to offer a comprehensive platform.
·thenewstack.io·
eBPF Security Power and Shortfalls
Reverse-Engineering The AMD Secure Processor Inside The CPU
Reverse-Engineering The AMD Secure Processor Inside The CPU
On an x86 system the BIOS is the first part of the system to become active along with the basic CPU core(s) functionality, or so things used to be until Intel introduced its Management Engine (IME)…
·hackaday.com·
Reverse-Engineering The AMD Secure Processor Inside The CPU
Reversing the AMD Secure Processor (PSP) - Part 2: Cryptographic Co-Processor (CCP)
Reversing the AMD Secure Processor (PSP) - Part 2: Cryptographic Co-Processor (CCP)
Part one: https://dayzerosec.com/blog/2023/04/17/reversing-the-amd-secure-processor-psp.html This is a follow-up part 2 to my previous post on the AMD Secure Processor (formerly known as the Platform Security Processor or "PSP"). In that post, I mentioned that the Cryptographic Co-Processor (CCP) is an essential component of how the PSP functions. It's primarily responsible for hardware-accelerated cryptography, but it's also used as a Direct Memory Access (DMA) copy engine for doing mass copy
·dayzerosec.com·
Reversing the AMD Secure Processor (PSP) - Part 2: Cryptographic Co-Processor (CCP)
gRPC-Gateway servers on AWS Lambda using Unix domain sockets
gRPC-Gateway servers on AWS Lambda using Unix domain sockets
I’ve really enjoyed using gRPC-Gateway to build gRPC/JSON-over-HTTP (RESTful) APIs in Go for quite a few years now. However, at first glance, itappears to be...
·ccampo.me·
gRPC-Gateway servers on AWS Lambda using Unix domain sockets
The Architecture of Network-Aware Domain Name System (DNS)
The Architecture of Network-Aware Domain Name System (DNS)
This document describes a framework which extends the Domain Name System (DNS) to provide network awareness to applications. The framework enables DNS system responses that are dependent on communication service requirements such as QoS or path without changes in the format of DNS protocol messages or application program interfaces (APIs). The different enhancement methods and use cases are discussed.
·datatracker.ietf.org·
The Architecture of Network-Aware Domain Name System (DNS)
Bechtolsheim Outlines Scaling XPU Performance By 100X By 2028
Bechtolsheim Outlines Scaling XPU Performance By 100X By 2028
Effects are multiplicative, not additive, when it comes to increasing compute engine performance. And if there is one person who is not worried about how
·nextplatform.com·
Bechtolsheim Outlines Scaling XPU Performance By 100X By 2028
Create an internal CLI
Create an internal CLI
Learn how to create a custom CLI for your organization using Just.
·blog.chay.dev·
Create an internal CLI
Supercharged Sagas Introduction
Supercharged Sagas Introduction
An introduction to NServiceBus Sagas and how they can be used to manage long-running processes in distributed systems.
·blog.nimblepros.com·
Supercharged Sagas Introduction
A Developer's Guide to ActivityPub and the Fediverse
A Developer's Guide to ActivityPub and the Fediverse
How do you integrate your own software with ActivityPub? We spoke with Evan Prodromou, who has written a book about fediverse development.
·thenewstack.io·
A Developer's Guide to ActivityPub and the Fediverse
What Is OpenTelemetry? The Ultimate Guide
What Is OpenTelemetry? The Ultimate Guide
OpenTelemetry is not merely an observability platform, but also a set of best practices and standards that can be integrated into platform engineering or DevOps.
·thenewstack.io·
What Is OpenTelemetry? The Ultimate Guide
Use Small Language Models To Deploy AI on a Budget
Use Small Language Models To Deploy AI on a Budget
SLMs are a much more cost-effective approach, allowing companies to adapt models to their proprietary data in secure environments.
·thenewstack.io·
Use Small Language Models To Deploy AI on a Budget