Lambda calculus - Wikipedia

System Architecture
Entscheidungsproblem - Wikipedia
In mathematics and computer science, the Entscheidungsproblem (German for 'decision problem'; .mw-parser-output .IPA-label-small{font-size:85%}.mw-parser-output .references .IPA-label-small,.mw-parser-output .infobox .IPA-label-small,.mw-parser-output .navbox .IPA-label-small{font-size:100%}pronounced [ɛntˈʃaɪ̯dʊŋspʁoˌbleːm]) is a challenge posed by David Hilbert and Wilhelm Ackermann in 1928.[1] It asks for an algorithm that considers an inputted statement and answers "yes" or "no" according to whether it is universally valid, i.e., valid in every structure.
Turing machine - Wikipedia
A Turing machine is a mathematical model of computation describing an abstract machine that manipulates symbols on a strip of tape according to a table of rules. Despite the model's simplicity, it is capable of implementing any computer algorithm.
AlanTuring.net The Turing-Church Thesis
Ramfs, rootfs and initramfs — The Linux Kernel documentation
WebP: The WebPage compression format
I want to provide a smooth experience to my site visitors, so I work on accessibility and ensure it works without JavaScript enabled. I care about page load time because some pages contain large illustrations, so I minify my HTML.
But one thing makes turning my blog light as a feather a pain in the ass.
Breakdown of Scheduling in Erlang - Mudassar Ali
Erlang as a real-time platform for multitasking uses Preemptive Scheduling. The responsibility of an Erlang scheduler is selecting a process and executing based on priority, time slice or reduction bases. Erlang processes are scheduled on a reduction count basis. One reduction is roughly equivalent to a function call.
Mastering Pipes and Filters: A Messaging System Pattern
Have you ever found yourself tangled in the complexity of building a processing pipeline, wrestling with how to correctly design a pipeline…
Linux's Bedtime Routine
How does Linux move from an awake machine to a hibernating one?
How does it then manage to restore all state?
These questions led me to read way too much C in trying to figure out
how this particular hardware/software boundary is navigated.
The list of architectural metapatterns
Classification of architectural patterns
OAuth from First Principles - Stack Auth
Stack Auth is open-source authentication for the modern web.
Failover Mechanism in Distributed Systems
Introduction
User-Agent header - Wikipedia
In computing, the User-Agent header is an HTTP header intended to identify the user agent responsible for making a given HTTP request. Whereas the character sequence User-Agent comprises the name of the header itself, the header value that a given user agent uses to identify itself is colloquially known as its user agent string. The user agent for the operator of a computer used to access the Web has encoded within the rules that govern its behavior the knowledge of how to negotiate its half of a request-response transaction; the user agent thus plays the role of the client in a client–server system. Often considered useful in networks is the ability to identify and distinguish the software facilitating a network session. For this reason, the User-Agent HTTP header exists to identify the client software to the responding server.
“Tor bridges,” a way to keep using Tor in countries that block it | RSF Resource for Journalists' Safety
In highly-censored regimes, circumvention tools like Tor — a browsing system which provides anonymity and unrestricted internet access — are often targeted by censors. In this article, Reporters Without Borders (RSF) introduces Tor bridges and explains how this technology can be used by journalists to access Tor. After blocking websites…
Orca
The Orca initiative aims to
produce a unified platform and set of APIs to develop, distribute and
run sandboxed graphical applications on a variety of operating
systems.
How Amazon Lambda Works 🔥
#55: Break Into Amazon Engineering (6 Minutes)
State and time are the same thing
State is time, time is state.
Let's fund the Fediverse | sub.club
IBM’s Latest Quantum Supercomputer Idea: The Hybrid Classical-Quantum System
Although quantum processors exist today, they are still a long way off from becoming practical replacements for classical computers. This is due to many practical considerations, not the least of w…
First Draft of a Report on the EDVAC - Wikipedia
The First Draft of a Report on the EDVAC (commonly shortened to First Draft) is an incomplete 101-page document written by John von Neumann and distributed on June 30, 1945 by Herman Goldstine, security officer on the classified ENIAC project. It contains the first published description of the logical design of a computer using the stored-program concept, which has come to be known as the von Neumann architecture; the name has become controversial due to von Neumann's failure to name other contributors.
eBPF Security Power and Shortfalls
A proper security provider that makes heavy use of eBPF will also build on eBPF’s functionalities to offer a comprehensive platform.
Reverse-Engineering The AMD Secure Processor Inside The CPU
On an x86 system the BIOS is the first part of the system to become active along with the basic CPU core(s) functionality, or so things used to be until Intel introduced its Management Engine (IME)…
Reversing the AMD Secure Processor (PSP) - Part 2: Cryptographic Co-Processor (CCP)
Part one: https://dayzerosec.com/blog/2023/04/17/reversing-the-amd-secure-processor-psp.html
This is a follow-up part 2 to my previous post on the AMD Secure Processor (formerly known as the Platform Security Processor or "PSP"). In that post, I mentioned that the Cryptographic Co-Processor (CCP) is an essential component of how the PSP functions. It's primarily responsible for hardware-accelerated cryptography, but it's also used as a Direct Memory Access (DMA) copy engine for doing mass copy
gRPC-Gateway servers on AWS Lambda using Unix domain sockets
I’ve really enjoyed using gRPC-Gateway to build gRPC/JSON-over-HTTP (RESTful) APIs in Go for quite a few years now. However, at first glance, itappears to be...
The Architecture of Network-Aware Domain Name System (DNS)
This document describes a framework which extends the Domain Name System (DNS) to provide network awareness to applications. The framework enables DNS system responses that are dependent on communication service requirements such as QoS or path without changes in the format of DNS protocol messages or application program interfaces (APIs). The different enhancement methods and use cases are discussed.
Bechtolsheim Outlines Scaling XPU Performance By 100X By 2028
Effects are multiplicative, not additive, when it comes to increasing compute engine performance. And if there is one person who is not worried about how
omg.lol - A lovable web page and email address, just for you
Treat yourself to an awesome web address, a devastatingly gorgeous profile page, a stellar email address, and tons more
Hardware/Network acceleration simplified-SR-IoV, NUMA, SmartNIC, QAT
Any easy-to-understand guide about SR-IoV, NUMA, QAT, SmartNIC and their importance for high performing servers/whitebox in edge computing
Create an internal CLI
Learn how to create a custom CLI for your organization using Just.
Initiative for Digital Public Infrastructure at UMass Amherst
at the University of Massachusetts Amherst