Interceptor pattern - Wikipedia

System Architecture
Silk Meets Silicon: The Dawn of Biological Hybrid Transistors
Microprocessor-scale transistors detect and respond to biological states and the environment. Your phone may have more than 15 billion tiny transistors packed into its microprocessor chips. The transistors are made of silicon, metals like gold and copper, and insulators that together take an elec
Welcome to MirageOS
MirageOS is a programming framework for building type-safe, modular systems.
Software Demystified: How does a Text Box Work?
Below is an excerpt from Street Coder, where Sedat Kapanoglu talks about opacity in software.
Introducing the idea of ‘hyperobjects’
A new way of understanding climate change and other phenomena.
At the End of the World, It’s Hyperobjects All the Way Down
Do you feel lost? Alone? Powerless in the face of forces beyond your control? Timothy Morton can help—if you’re ready to have your reality blown apart.
Timothy Morton - Wikipedia
Does Kubernetes Really Perform Better on Bare Metal vs. VMs?
A detailed comparison of CPU, RAM, storage and network performance between Kubernetes clusters on virtual machines and bare metal.
404 → 307: What?
Hypertext Style: Cool URIs don't change.
Solving duplicate data with performant deduplication | QuestDB
Revival of Medley/Interlisp: Elegant weapon sharpened
Restoration project headed up by Steve Kaisler is gathering steam
Everything You Need to Know About Consistent Hashing
#23: Read Now - Algorithm to Build a Planet-Scale Distributed Cache (4 minutes)
Write your own tiny programming system(s)! | D3S
Nebulon unveils compact DPU for edge servers – Blocks and Files
Nebulon has developed a DPU specifically for edge servers, enabling their CPUs to fully focus on running applications.
RFC 9460: Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)
This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.
RFC 6742: DNS Resource Records for the Identifier-Locator Network Protocol (ILNP)
This note describes additional optional resource records for use with the Domain Name System (DNS). These optional resource records are for use with the Identifier-Locator Network Protocol (ILNP). This document is a product of the IRTF Routing Research Group. This document defines an Experimental Protocol for the Internet community.
RFC 2163: Using the Internet DNS to Distribute MIXER Conformant Global Address Mapping (MCGAM)
RFC 4701: A DNS Resource Record (RR) for Encoding Dynamic Host Configuration Protocol (DHCP) Information (DHCID RR)
What is an Isolated Browser?
TLDR: A demo speaks louder than a thousand words. You can connect to an isolated browser created by me and my team via browserling.com/browse. We run isolated browsers on our servers and stream just the browser window to you. ## Isolated Browser – What Is It? An isolated browser, also known as browser isolation is a...
Vector Databases: Where Geometry Meets Machine Learning
A professor of semantic data processing channels Harry Potter to explain the role of advanced vector databases for better AI/ML performance.
dApps Are About Control, Not Blockchains
Decentralized applications, where the identity and application data are both controlled by the person using the app provide the means of disintermediting companies who leverage their privileged position to work for their own interests and against ours.
Incremental Processing using Netflix Maestro and Apache Iceberg
by Jun He, Yingyi Zhang, and Pawan Dixit
Microsoft adds FPGA-powered network accelerator to Azure
'Azure Boost' vastly speeds cloudy server IOPS and is coming to all new instance types
Making sense of Nvidia's SuperNIC
If you're doing AI but would rather not do InfiniBand, this NIC is for you
Trust in and maintenance of filesystems
The Linux kernel supports a wide variety of filesystems, many of which are
no longer in heavy use — or, perhaps, any use at all. The kernel code
implementing the less-popular filesystems tends to be relatively unpopular
as well, receiving little in the way of maintenance. Keeping old
filesystems alive does place a burden on kernel developers, though, so it
is not surprising that there is pressure to remove the least popular ones.
At the 2023 Kernel Maintainers Summit, the developers talked about these
filesystems and what can be done about them.
NASA’s Deep Space Optical Comm Demo Sends, Receives First Data
DSOC, an experiment that could transform how spacecraft communicate, has achieved ‘first light,’ sending data via laser to and from far beyond the Moon for the first time.
The GNU Name System — GNUnet documentation
RFC 9498: The GNU Name System
This document provides the GNU Name System (GNS) technical
specification.
GNS is a decentralized and censorship-resistant domain name
resolution protocol that provides a privacy-enhancing alternative to the
Domain Name System (DNS) protocols.
This document defines the normative wire format of resource records,
resolution processes, cryptographic routines, and security and privacy
considerations for use by implementers.
This specification was developed outside the IETF and does not have
IETF consensus. It is published here to inform readers about the
function of GNS, guide future GNS implementations, and ensure
interoperability among implementations (for example, pre-existing
GNUnet implementations).
RFC 9505: A Survey of Worldwide Censorship Techniques
This document describes technical mechanisms employed in network
censorship that regimes around the world use for blocking or impairing
Internet traffic. It aims to make designers, implementers, and users of
Internet protocols aware of the properties exploited and mechanisms used
for censoring end-user access to information. This document makes no
suggestions on individual protocol considerations, and is purely
informational, intended as a reference. This document is a product of
the Privacy Enhancement and Assessment Research Group (PEARG) in the
IRTF.