System Architecture

System Architecture

7363 bookmarks
Custom sorting
EdDSA, Ed25519, Ed25519-IETF, Ed25519ph, Ed25519ctx, HashEdDSA, PureEdDSA, WTF?
EdDSA, Ed25519, Ed25519-IETF, Ed25519ph, Ed25519ctx, HashEdDSA, PureEdDSA, WTF?
The Edwards-curve Digital Signature Algorithm (EdDSA) You've heard of EdDSA right? The shiny and new signature scheme (well new, it's been here since 2008, wake up). Since its inception, EdDSA has evolved quite a lot, and some amount of standardization process has happened to it. It's even doomed to be adopted by the NIST in FIPS 186-5! First, some definition: EdDSA stands for Edwards-curve Digit ...
·cryptologie.net·
EdDSA, Ed25519, Ed25519-IETF, Ed25519ph, Ed25519ctx, HashEdDSA, PureEdDSA, WTF?
Git Query language
Git Query language
A SQL Like query language to perform queries on .git files.
·amrdeveloper.github.io·
Git Query language
ULIDs and Primary Keys
ULIDs and Primary Keys
Not all non-sequential primary keys are created equal, the ULID format is a fantastic substitute for the typical UUIDv4 choice.
·blog.daveallie.com·
ULIDs and Primary Keys
If You Want To Sell AI To Enterprises, You Need To Sell Ethernet - The Next Platform
If You Want To Sell AI To Enterprises, You Need To Sell Ethernet - The Next Platform
Server makers Dell, Hewlett Packard Enterprise, and Lenovo, who are the three largest original manufacturers of systems in the world, ranked in that order, are adding to the spectrum of interconnects they offer to their enterprise customers. And when we say that, we really do mean spectrum, and specially we mean the combination of Spectrum-4
·nextplatform.com·
If You Want To Sell AI To Enterprises, You Need To Sell Ethernet - The Next Platform
Fission
Fission
Fast Opensource Kubernetes Serverless Framework
·fission.io·
Fission
What is a URL Sandbox?
What is a URL Sandbox?
TLDR: A demo speaks louder than a thousand words. You can connect to a URL sandbox created by me and my team via browserling.com/browse. We run browsers in virtual machines and stream them to you as a video. This way, you can open suspicious URLs in a sandboxed environment without risking the security of your own...
·catonmat.net·
What is a URL Sandbox?
Deep dive into CheerpJ 3.0: A WebAssembly Java Virtual Machine for the browser
Deep dive into CheerpJ 3.0: A WebAssembly Java Virtual Machine for the browser
CheerpJ is a WebAssembly-based JVM that runs fully client side in the browser. It supports Java applications, legacy applets and libraries, with no need for compilation, server backends, plugins, or post-processing steps. CheerpJ 3.0 introduces a completely new JIT-based architecture which makes the tool faster, more usable and much more powerful.
·labs.leaningtech.com·
Deep dive into CheerpJ 3.0: A WebAssembly Java Virtual Machine for the browser
Redefining datacenter connectivity with open source networking - The Next Platform
Redefining datacenter connectivity with open source networking - The Next Platform
SPONSORED FEATURE: The face of modern networking is changing dramatically in parallel with the exponential increase in the volume of data traffic over the last several years. Enterprises and cloud service providers alike are struggling to handle that transmission workload, whilst simultaneously trying to contain costs. It’s a tall order to deliver enough capacity and
·nextplatform.com·
Redefining datacenter connectivity with open source networking - The Next Platform
How OpenID Connect Works - OpenID Foundation
How OpenID Connect Works - OpenID Foundation
What is OpenID Connect OpenID Connect is an interoperable authentication protocol based on the OAuth 2.0 framework of specifications (IETF RFC 6749 and 6750). It simplifies the way to verify the identity of users based on the authentication performed by an Authorization Server and to obtain user profile information in an interoperable and REST-like manner.OpenID
·openid.net·
How OpenID Connect Works - OpenID Foundation
How a Popular Combo Provides DDoS Protection
How a Popular Combo Provides DDoS Protection
Border Gateway Protocol and Generic Routing Encapsulation allow rerouting of traffic to scrubbing centers where harmful data is filtered out.
·thenewstack.io·
How a Popular Combo Provides DDoS Protection
Hector Martin (@marcan@treehouse.systems)
Hector Martin (@marcan@treehouse.systems)
WARNING for Raspberry Pi 5 NAS users: **If you use btrfs to set up a Raspberry Pi 5 as a NAS, your filesystem will not be mountable from almost all other machines unless you use `mkfs.btrfs -s 4096`**. The Raspberry Pi 5 uses 16K pages by default, and as of today this is the default block size for mkfs.btrfs upstream on such systems. **btrfs does not support mounting 16K block size filesystems on x86 machines, or any machine with a 4K page size**. We knew this was going to be a problem for Asahi Linux (which also uses 16K pages), so Fedora ARM64 has long carried a patch to change the default to 4K. Unfortunately, even though we submitted it upstream a long time ago, the btrfs-progs maintainers have chosen not to apply it at this time. If you format a btrfs filesystem on a Raspberry Pi 5 normally, it will work, but you will be setting yourself up for a terrible disaster recovery scenario: If the Pi ever stops working, you will have to *find another one* (or an Apple Silicon laptop) to gain access to your data again - and no replacing/upgrading the Pi with any other machine (except a Mac) without a full disk reformat.
·social.treehouse.systems·
Hector Martin (@marcan@treehouse.systems)
RFC 9511: Attribution of Internet Probes
RFC 9511: Attribution of Internet Probes
Active measurements over the public Internet can target either collaborating parties or non-collaborating ones. Sometimes these measurements, also called "probes", are viewed as unwelcome or aggressive. This document suggests some simple techniques for a source to identify its probes. This allows any party or organization to understand what an unsolicited probe packet is, what its purpose is, and, most importantly, who to contact. The technique relies on offline analysis of the probe; therefore, it does not require any change in the data or control plane. It has been designed mainly for layer 3 measurements.
·rfc-editor.org·
RFC 9511: Attribution of Internet Probes
HPC Pioneers Pave The Way For A Flood Of Arm Supercomputers - The Next Platform
HPC Pioneers Pave The Way For A Flood Of Arm Supercomputers - The Next Platform
Over the past few years, the Arm architecture has made steady gains, particularly among the hyperscalers and cloud builders. But in the HPC community, Arm remains under-represented. But perhaps not for long. The “Fugaku” system at RIKEN Lab in Japan is without a doubt the largest and best known Arm supercomputer, and blazed the technological
·nextplatform.com·
HPC Pioneers Pave The Way For A Flood Of Arm Supercomputers - The Next Platform
CUPID—for joyful coding
CUPID—for joyful coding
What started as lighthearted iconoclasm, poking at the bear of SOLID, has developed into something more concrete and tangible. If I do not think the SOLID principles are useful these days, then what would I replace them with? Can any set of principles hold for all software? What do we even mean by principles?
·dannorth.net·
CUPID—for joyful coding