Kill Web: Why the U.S. Military Sees Speed as the Ultimate Weapon | The National Interest

System Architecture
Real time cross-domain kill webs -- ACK and STITCHES | Acquisition Talk
Two DARPA-developed technologies – a novel decision aid for mission commanders and a rapid software integration tool – played a critical role in the recent Air Force demonstration.
Transitioning from the kill chain to the kill web - Military Embedded Systems
WARFARE EVOLUTION BLOG: My last post outlined the strategic reviews and national defense priorities that sit on top of the kill chain. Defense planners at the Defense Advanced Research Projects Agency (DARPA) are now looking at transitioning to a concept they've dubbed the kill web.
Joint All-Domain Command and Control - Wikipedia
The challenge of compiling for verified architectures
On its surface, the BPF virtual machine resembles many other computer
architectures; it has registers and instructions to perform the usual
operations. But there is a key difference: BPF programs must pass the
kernel's verifier before they can be run. The verifier imposes a long list
of additional restrictions so that it can prove to itself that any given
program is safe to run; getting past those checks can be a source of
frustration for BPF developers. At the 2023 GNU Tools Cauldron,
José Marchesi looked at the problem of compiling for verified architectures
and how the compiler can generate code that will pass verification.
Intelligence too cheap to meter
Posted on Friday 6 Oct 2023. 738 words, 6 links. By Matt Webb.
On Multiplayer Fintech
Over the past decade, the desire to share and collaborate has fueled the rise of multiplayer software across many markets and industries…
Sharing Money Shouldn’t Be Hard. Introducing Braid.
In 2020, it’s really easy to send money, but still hard to share it.
Zero Data
Like Zero Trust, Zero Data represents a paradigm that organizations can embrace to enhance their overall security posture. But the benefits go far beyond better security.
BPF and security
The eBPF in-kernel virtual machine is
approaching its tenth anniversary as part of Linux; it has grown into a
tool with many types of uses in the ecosystem. Alexei Starovoitov, who
was the creator of eBPF and did much of the development of it, especially
in the early going, gave the opening talk at
Linux
Security Summit Europe 2023 on the relationship between BPF and
security. In it, he related some interesting history, from a somewhat
different perspective than what is often described, he said. Among other
things, it shows how BPF
has been both a security problem and a security solution along the way.
Why HTTP Caching Matters for APIs
When users encounter slow load times or delays in response from any web application or API, they are more likely to abandon it. Caching plays a crucial role in improving performance and efficiency. Here's how it works.
Cloud Cost-Unit Economics — A Modern Profitability Model
We have tools available to uncover the necessary data and context to support a sophisticated analytics model on cloud costs.
What Is API Management?
API management is a crucial practice for organizations that rely on APIs. Learn all about managing APIs and get the details about API management tools, platforms, and solutions.
AOL - Wikipedia
William von Meister - Wikipedia
PlayNET - Wikipedia
Aol.com : how Steve Case beat Bill Gates, nailed the netheads, and made millions in the war for the Web : Swisher, Kara : Free Download, Borrow, and Streaming : Internet Archive
Hooked on Startups, He Invented Infocast - Radio World
The Source (online service) - Wikipedia
Quantum Link - Wikipedia
Timeseries Insights API | Google Cloud
Large scale time series forecasting and anomaly detection in real time.
Intel to Spin-off Programmable Solutions Group as Standalone Business, Eyeing IPO in 2-3 Years
Attribute-Based Access Control (ABAC) VS. Relationship-Based Access Control (ReBAC) | Permit
ABAC vs. ReBAC - A comprehensive guide to the pros, cons, use cases, and implementation of these common authorization models
Cloud Native Buildpacks · Cloud Native Buildpacks
Cloud Native Buildpacks transform your application source code into images that can run on any cloud.
Governing the Title of Your APIs With Spectral Rules
I enjoy how developing Spectral rules to govern an API slows us down to think about what matters. Really this is the biggest problem I see with people building APIs—-they are just moving too fast, and they refuse to slow down and think too deeply about things. I enjoy the frame rate in which Spectral rules attach themselves to the contracts we are producing for our APIs, and I figured I’d further expand on the opportunity to tell some stories around these machine-readable API policies we are applying, or often times not applying consistently across our API operations.
Elixir Streams | Strong Arrows
Elixir and Phoenix tips, courses, and more.
Microsoft Bob - Wikipedia
The Bus That’s Not A Bus: The Joys Of Hacking PCI Express
PCI Express (PCIe) has been around since 2003, and in that time it has managed to become the primary data interconnect for not only expansion cards, but also high-speed external devices. What also …
PCI Express: the bus that’s not a bus & the joys of hacking it #PCIe @Hackaday
Everyone is excited over the Raspberry Pi 5 getting explicit PCI Express (PCIe) bus capability (some Raspberry Pi 4 boards were hacked to get to internal PCIe lanes). PCIe has been in modern deskt…
How Pinterest scaled to 11 million users with only 6 engineers
Pinterest's tech stack explained simply (5 minute read)