System Architecture

System Architecture

7404 bookmarks
Custom sorting
Real time cross-domain kill webs -- ACK and STITCHES | Acquisition Talk
Real time cross-domain kill webs -- ACK and STITCHES | Acquisition Talk
Two DARPA-developed technologies – a novel decision aid for mission commanders and a rapid software integration tool – played a critical role in the recent Air Force demonstration.
·acquisitiontalk.com·
Real time cross-domain kill webs -- ACK and STITCHES | Acquisition Talk
Transitioning from the kill chain to the kill web - Military Embedded Systems
Transitioning from the kill chain to the kill web - Military Embedded Systems
WARFARE EVOLUTION BLOG: My last post outlined the strategic reviews and national defense priorities that sit on top of the kill chain. Defense planners at the Defense Advanced Research Projects Agency (DARPA) are now looking at transitioning to a concept they've dubbed the kill web.
·militaryembedded.com·
Transitioning from the kill chain to the kill web - Military Embedded Systems
The challenge of compiling for verified architectures
The challenge of compiling for verified architectures
On its surface, the BPF virtual machine resembles many other computer architectures; it has registers and instructions to perform the usual operations. But there is a key difference: BPF programs must pass the kernel's verifier before they can be run. The verifier imposes a long list of additional restrictions so that it can prove to itself that any given program is safe to run; getting past those checks can be a source of frustration for BPF developers. At the 2023 GNU Tools Cauldron, José Marchesi looked at the problem of compiling for verified architectures and how the compiler can generate code that will pass verification.
·lwn.net·
The challenge of compiling for verified architectures
Intelligence too cheap to meter
Intelligence too cheap to meter
Posted on Friday 6 Oct 2023. 738 words, 6 links. By Matt Webb.
·interconnected.org·
Intelligence too cheap to meter
On Multiplayer Fintech
On Multiplayer Fintech
Over the past decade, the desire to share and collaborate has fueled the rise of multiplayer software across many markets and industries…
·medium.com·
On Multiplayer Fintech
Zero Data
Zero Data
Like Zero Trust, Zero Data represents a paradigm that organizations can embrace to enhance their overall security posture. But the benefits go far beyond better security.
·windley.com·
Zero Data
BPF and security
BPF and security
The eBPF in-kernel virtual machine is approaching its tenth anniversary as part of Linux; it has grown into a tool with many types of uses in the ecosystem. Alexei Starovoitov, who was the creator of eBPF and did much of the development of it, especially in the early going, gave the opening talk at Linux Security Summit Europe 2023 on the relationship between BPF and security. In it, he related some interesting history, from a somewhat different perspective than what is often described, he said. Among other things, it shows how BPF has been both a security problem and a security solution along the way.
·lwn.net·
BPF and security
Why HTTP Caching Matters for APIs
Why HTTP Caching Matters for APIs
When users encounter slow load times or delays in response from any web application or API, they are more likely to abandon it. Caching plays a crucial role in improving performance and efficiency. Here's how it works.
·thenewstack.io·
Why HTTP Caching Matters for APIs
What Is API Management?
What Is API Management?
API management is a crucial practice for organizations that rely on APIs. Learn all about managing APIs and get the details about API management tools, platforms, and solutions.
·thenewstack.io·
What Is API Management?
Governing the Title of Your APIs With Spectral Rules
Governing the Title of Your APIs With Spectral Rules
I enjoy how developing Spectral rules to govern an API slows us down to think about what matters. Really this is the biggest problem I see with people building APIs—-they are just moving too fast, and they refuse to slow down and think too deeply about things. I enjoy the frame rate in which Spectral rules attach themselves to the contracts we are producing for our APIs, and I figured I’d further expand on the opportunity to tell some stories around these machine-readable API policies we are applying, or often times not applying consistently across our API operations.
·apievangelist.com·
Governing the Title of Your APIs With Spectral Rules
The Bus That’s Not A Bus: The Joys Of Hacking PCI Express
The Bus That’s Not A Bus: The Joys Of Hacking PCI Express
PCI Express (PCIe) has been around since 2003, and in that time it has managed to become the primary data interconnect for not only expansion cards, but also high-speed external devices. What also …
·hackaday.com·
The Bus That’s Not A Bus: The Joys Of Hacking PCI Express