System Architecture

System Architecture

7363 bookmarks
Custom sorting
I Have a Verifiable Credential, Now What?
I Have a Verifiable Credential, Now What?
There is extensive work in the community to standardize elements involved in decentralized identities, and soon it will be much easier to use them.
·thenewstack.io·
I Have a Verifiable Credential, Now What?
mountebank - over the wire test doubles
mountebank - over the wire test doubles
mountebank is the first open source, cross-platform, multi-protocol service virtualization tool
·mbtest.org·
mountebank - over the wire test doubles
A New Frontier | Voltron Data
A New Frontier | Voltron Data
Discover the origins and technology behind composable data systems. Learn about the key layers of data systems, and how to build by reusing open source software components and open standards.
·voltrondata.com·
A New Frontier | Voltron Data
What is an Authority to Operate (ATO)?
What is an Authority to Operate (ATO)?
For companies with dual-use software products—those with both civilian and military applications—an ATO can be a significant barrier to entry to the government market. The variable cost and extended timeline often prove fatal to startups targeting DOD customers, which has implications far beyond those companies.
·secondfront.com·
What is an Authority to Operate (ATO)?
Platform Engineering, Yes/No? A Guide to Making the Call
Platform Engineering, Yes/No? A Guide to Making the Call
Before adopting platform engineering, companies should consider if it's the right fit for where they are in their software development journey.
·thenewstack.io·
Platform Engineering, Yes/No? A Guide to Making the Call
Rethinking multi-grain timestamps
Rethinking multi-grain timestamps
One of the significant features added to the mainline kernel during the 6.6 merge window was multi-grain timestamps, which allow the kernel to selectively store file modification times with higher resolution without hurting performance. Unfortunately, this feature also caused some surprising regressions, and was quickly ushered back out of the kernel as a result. It is instructive to look at how this feature went wrong, and how the developers involved plan to move forward from here.
·lwn.net·
Rethinking multi-grain timestamps
The Rise and Decline of Strategic Paralysis | Small Wars Journal
The Rise and Decline of Strategic Paralysis | Small Wars Journal
Any future framework for operational adaptation must incorporate the effects of technological change, while avoiding the seductions of strategic paralysis theory.
·smallwarsjournal.com·
The Rise and Decline of Strategic Paralysis | Small Wars Journal
Origins of the Kill Web - Military Embedded Systems
Origins of the Kill Web - Military Embedded Systems
WARFARE EVOLUTION BLOG: DARPA (Defense Advanced Research Projects Agency) officials announced the concept of the Kill Web at the C4ISRNET Conference in May 2018. Throughout the history of war, many elements of the Kill Web were being developed independently, but the dots were not connected until Admiral William Owens wrote a paper about a “system of systems”. He proposed integrating command-and-control, the intelligence from the sensors, and the weapons together in the mid 1990s. He also coined the acronym ISR (for intelligence, surveillance, and reconnaissance).
·militaryembedded.com·
Origins of the Kill Web - Military Embedded Systems
Kill Webs, Engagement Density and Escalation Management | Defense.info
Kill Webs, Engagement Density and Escalation Management | Defense.info
Recently, we interviewed a USAF retired Colonel who was both a combat  veteran and test pilot, Robert “Juice” Newton, with regard to the strategic shift from the land wars to military competition and engagement with peer competitors. Juice has had extensive engagement in the Middle Eastern land wars, and is now focused on advanced technology […]
·defense.info·
Kill Webs, Engagement Density and Escalation Management | Defense.info
Creating cross-domain kill webs in real time
Creating cross-domain kill webs in real time
Two DARPA-developed technologies—a novel decision aid for mission commanders and a rapid software integration tool—played a critical role in the recent Air Force demonstration of the Advanced Battle Management System (ABMS).
·techxplore.com·
Creating cross-domain kill webs in real time
Real time cross-domain kill webs -- ACK and STITCHES | Acquisition Talk
Real time cross-domain kill webs -- ACK and STITCHES | Acquisition Talk
Two DARPA-developed technologies – a novel decision aid for mission commanders and a rapid software integration tool – played a critical role in the recent Air Force demonstration.
·acquisitiontalk.com·
Real time cross-domain kill webs -- ACK and STITCHES | Acquisition Talk
Transitioning from the kill chain to the kill web - Military Embedded Systems
Transitioning from the kill chain to the kill web - Military Embedded Systems
WARFARE EVOLUTION BLOG: My last post outlined the strategic reviews and national defense priorities that sit on top of the kill chain. Defense planners at the Defense Advanced Research Projects Agency (DARPA) are now looking at transitioning to a concept they've dubbed the kill web.
·militaryembedded.com·
Transitioning from the kill chain to the kill web - Military Embedded Systems
The challenge of compiling for verified architectures
The challenge of compiling for verified architectures
On its surface, the BPF virtual machine resembles many other computer architectures; it has registers and instructions to perform the usual operations. But there is a key difference: BPF programs must pass the kernel's verifier before they can be run. The verifier imposes a long list of additional restrictions so that it can prove to itself that any given program is safe to run; getting past those checks can be a source of frustration for BPF developers. At the 2023 GNU Tools Cauldron, José Marchesi looked at the problem of compiling for verified architectures and how the compiler can generate code that will pass verification.
·lwn.net·
The challenge of compiling for verified architectures
Intelligence too cheap to meter
Intelligence too cheap to meter
Posted on Friday 6 Oct 2023. 738 words, 6 links. By Matt Webb.
·interconnected.org·
Intelligence too cheap to meter
On Multiplayer Fintech
On Multiplayer Fintech
Over the past decade, the desire to share and collaborate has fueled the rise of multiplayer software across many markets and industries…
·medium.com·
On Multiplayer Fintech
Zero Data
Zero Data
Like Zero Trust, Zero Data represents a paradigm that organizations can embrace to enhance their overall security posture. But the benefits go far beyond better security.
·windley.com·
Zero Data
BPF and security
BPF and security
The eBPF in-kernel virtual machine is approaching its tenth anniversary as part of Linux; it has grown into a tool with many types of uses in the ecosystem. Alexei Starovoitov, who was the creator of eBPF and did much of the development of it, especially in the early going, gave the opening talk at Linux Security Summit Europe 2023 on the relationship between BPF and security. In it, he related some interesting history, from a somewhat different perspective than what is often described, he said. Among other things, it shows how BPF has been both a security problem and a security solution along the way.
·lwn.net·
BPF and security
Why HTTP Caching Matters for APIs
Why HTTP Caching Matters for APIs
When users encounter slow load times or delays in response from any web application or API, they are more likely to abandon it. Caching plays a crucial role in improving performance and efficiency. Here's how it works.
·thenewstack.io·
Why HTTP Caching Matters for APIs