System Architecture

System Architecture

7363 bookmarks
Custom sorting
Reverse-engineering an encrypted IoT protocol #ReverseEngineering #IoT
Reverse-engineering an encrypted IoT protocol #ReverseEngineering #IoT
Scott reverse-engineered the encrypted protocol GoodWe smart meters and solar inverters use to send metrics to the cloud. The result of my lucky dip was a GoodWe DNS G3 Inverter and a GoodWe HomeKi…
·blog.adafruit.com·
Reverse-engineering an encrypted IoT protocol #ReverseEngineering #IoT
Tigris | Globally Distributed S3-Compatible Object Storage
Tigris | Globally Distributed S3-Compatible Object Storage
Tigris is a globally distributed S3-compatible object storage service that provides low latency anywhere in the world, enabling developers to store and access any amount of data for a wide range of use cases.
·tigrisdata.com·
Tigris | Globally Distributed S3-Compatible Object Storage
The Once And Future FPGA Maker Altera
The Once And Future FPGA Maker Altera
Back in 2015, when we were launching The Next Platform, a lot of stuff was going on all at the same time, which is part of the zeitgeist that we were
·nextplatform.com·
The Once And Future FPGA Maker Altera
Keeping secrets out of public repositories
Keeping secrets out of public repositories
With push protection now enabled by default, GitHub helps open source developers safeguard their secrets, and their reputations.
·github.blog·
Keeping secrets out of public repositories
AMD issues fixes for processor vulnerabilities
AMD issues fixes for processor vulnerabilities
Researchers disclosed multiple potential vulnerabilities that may impact some AMD processors, including Zen-based product lines across multiple generations.
·networkworld.com·
AMD issues fixes for processor vulnerabilities
Safer Image Builds with Cloud Native Buildpacks and Wolfi
Safer Image Builds with Cloud Native Buildpacks and Wolfi
This post discusses how to create containers that are smaller and more secure by including Wolfi as the base image when creating containers using Cloud Native Buildpacks.
·thenewstack.io·
Safer Image Builds with Cloud Native Buildpacks and Wolfi
TsFile: A Standard Format for IoT Time Series Data
TsFile: A Standard Format for IoT Time Series Data
The columnar storage file format is designed for IoT’s unique needs, including reduced network transmission and cloud computing resources.
·thenewstack.io·
TsFile: A Standard Format for IoT Time Series Data
Demystifying Message Brokers: Part 2 - RabbitMQ
Demystifying Message Brokers: Part 2 - RabbitMQ
In the previous part we've talked about message brokers in general and I hope you got a brief understanding of how they work and why you'd need them. In this article, we're going to dive deeper and explore one of them - **RabbitMQ**.
·anakidze.dev·
Demystifying Message Brokers: Part 2 - RabbitMQ
Inside Minority Report's 'Idea Summit,' Visionaries Saw the Future
Inside Minority Report's 'Idea Summit,' Visionaries Saw the Future
Three years before making Minority Report, director Steven Spielberg assembled a supergroup of deep thinkers who conceptualized many of the movie's most enduring visions of the future. A virtual roundtable takes you back to that momentous event in the history of sci-fi filmmaking.
·wired.com·
Inside Minority Report's 'Idea Summit,' Visionaries Saw the Future
It’s Humans All the Way Down
It’s Humans All the Way Down
Writing about the big beautiful mess that is making things for the world wide web.
·blog.jim-nielsen.com·
It’s Humans All the Way Down
A tale of three architectures
A tale of three architectures
It’s been a couple years of working full-time on Luro and we’ve travelled through at least three (or four?) different distinct architectures. If that sounds like a lot, I’d agree. It’s been educational to say the least.
·daverupert.com·
A tale of three architectures
What is a reliable Data System?
What is a reliable Data System?
Learn the concepts of reliability, and how to define a reliable data system
·note.datengineer.dev·
What is a reliable Data System?
Planning vs Model Checking
Planning vs Model Checking
Comparing two software technologies you've probably never heard of
·buttondown.email·
Planning vs Model Checking
Planner programming blows my mind
Planner programming blows my mind
Picat is a research language intended to combine logic programming, imperative programming, and constraint solving. I originally learned it to help with vacation scheduling but soon discovered its planner module, which is one of the most fascinating programming models I’ve ever seen. First, a brief explanation of logic programming (LP). In imperative and functional programming, we take inputs and write algorithms that produce outputs. In LP and constraint solving, we instead provide a set of equations and find assignments that satisfy those relationships.
·hillelwayne.com·
Planner programming blows my mind
Strengthening Zero Trust strategy with SSE
Strengthening Zero Trust strategy with SSE
In today's rapidly evolving digital landscape, organizations face constant attacks from a multitude of sophisticated cyber threats and as traditional perimeter-based security models are becoming less effective against modern attacks, a paradigm shift towards a Zero Trust security strategy has gained significant momentum.
·networkworld.com·
Strengthening Zero Trust strategy with SSE
What is a vector database?
What is a vector database?
Vector databases are specialized systems to store, manage, and query data in the form of vector embeddings. They are optimized for similarity search, which involves finding the most similar items to a given query vector.
·blog.meilisearch.com·
What is a vector database?