System Architecture

System Architecture

7404 bookmarks
Custom sorting
Cybersecurity Math
Cybersecurity Math
CM.1 How you can use math to reconcile cybersecurity
·medium.com·
Cybersecurity Math
cr.yp.to
cr.yp.to
·cr.yp.to·
cr.yp.to
Meta Pseudo Labels (MPL) Algorithm
Meta Pseudo Labels (MPL) Algorithm
AI-ContentLab is an artificial intelligence technical content provider, focused on delivering high-quality article, tutorials, and blog posts
·ai-contentlab.com·
Meta Pseudo Labels (MPL) Algorithm
Dropping Packets From Unikernels
Dropping Packets From Unikernels
For quite some time now ops has auto-generated firewall rules for various cloud providers such as GCP and AWS. In this tutorial we learn how to implement a network firewall in the Nanos unikernel through simple configuration.
·nanovms.com·
Dropping Packets From Unikernels
Generic iterators for BPF
Generic iterators for BPF
BPF programs destined to be loaded into the kernel are generally written in C but, increasingly, the environment in which those programs run differs significantly from the C environment. The BPF virtual machine and associated verifier make a growing set of checks in an attempt to make BPF code safe to run. The proposed addition of an iterator mechanism to BPF highlights the kind of features that are being added — as well as the constraints placed on programmers by BPF.
·lwn.net·
Generic iterators for BPF
Defining DORA-Like Metrics for Security Engineering
Defining DORA-Like Metrics for Security Engineering
With operational availability now essentially publicly available, security is capable of much the same thing focusing on velocity and safety.
·thenewstack.io·
Defining DORA-Like Metrics for Security Engineering
Building a basic search experience with Postgres
Building a basic search experience with Postgres
Building search functionality in products is a common task. Many solutions exist to solve this problem already. OpenSource tools like opensearch and mellisearch are some examples that are very commonly used. Using a 3rd party tool to build a “full-text search” is a good bet if you have a lot of data (i.e. a lot of users). The goal of this post is to have a look at some in-built tools to build a minimalist search feature when your data is backed by a Postgres (or any SQL) database.
·pacenthink.io·
Building a basic search experience with Postgres
The workload-first approach to CPU innovation
The workload-first approach to CPU innovation
Sponsored Post: As in so many other aspects of life, not all compute workloads are created equal – they need a more subtle approach to getting the best
·nextplatform.com·
The workload-first approach to CPU innovation
Why Audit Logs Are Important
Why Audit Logs Are Important
Administrators and compliance teams can use audit logs to investigate user actions, spot suspect activity and adhere to regulatory frameworks.
·thenewstack.io·
Why Audit Logs Are Important
Zero-copy I/O for ublk, three different ways
Zero-copy I/O for ublk, three different ways
The ublk subsystem enables the creation of user-space block drivers that communicate with the kernel using io_uring. Drivers implemented this way show some promise with regard to performance, but there is a bottleneck in the way: copying data between the kernel and the user-space driver's address space. It is thus not surprising that there is interest in implementing zero-copy I/O for ublk. The mailing lists have recently seen three different proposals for how this could be done.
·lwn.net·
Zero-copy I/O for ublk, three different ways
Rules as code for more responsive governance
Rules as code for more responsive governance
Using rules as code to help bridge the gaps between policy creation, its implementation, and its, often unintended, effects on people was the subject of a talk by Pia Andrews on the first day of the inaugural Everything Open conference in Melbourne, Australia. She has long been exploring the space of open government, and her talk was a report on what she and others have been working on over the last seven years. Everything Open is the successor to the long-running, well-regarded linux.conf.au (LCA); Andrews (then Pia Waugh) gave the opening keynote at LCA 2017 in Hobart, Tasmania, and helped organize the 2007 event in Sydney.
·lwn.net·
Rules as code for more responsive governance
Visible APIs get reused, not reinvented
Visible APIs get reused, not reinvented
How open API specifications can help developers—and computers—understand your APIs.
·stackoverflow.blog·
Visible APIs get reused, not reinvented
FLEDGE - Chrome Developers
FLEDGE - Chrome Developers
A proposal for on-device ad auctions to choose relevant ads from websites a user has previously visited, designed so it cannot be used by third parties to track user browsing behavior across sites.
·developer.chrome.com·
FLEDGE - Chrome Developers
Partnering with Fastly—Oblivious HTTP relay for FLEDGE's 𝑘-anonymity server - Chrome Developers
Partnering with Fastly—Oblivious HTTP relay for FLEDGE's 𝑘-anonymity server - Chrome Developers
We are improving Chrome’s privacy measures by partnering with Fastly to implement the 𝑘-anonymity server for FLEDGE. With data being relayed through an OHTTP relay in this implementation, Google servers do not receive the IP addresses of end users. The 𝑘-anonymity server is an incremental step towards the full implementation of FLEDGE.
·developer.chrome.com·
Partnering with Fastly—Oblivious HTTP relay for FLEDGE's 𝑘-anonymity server - Chrome Developers
DOE Wants A Hub And Spoke System Of HPC Systems
DOE Wants A Hub And Spoke System Of HPC Systems
We talk about scale a lot here at The Next Platform, but there are many different aspects to this beyond lashing a bunch of nodes together and counting
·nextplatform.com·
DOE Wants A Hub And Spoke System Of HPC Systems
Time is Code, my Friend
Time is Code, my Friend
For several years, the fast startup time of an application or service in Java has been a highly discussed topic. According to the authors of numerous articles, it seems if you don’t apply som…
·atbash.be·
Time is Code, my Friend
Revisiting stamps for email
Revisiting stamps for email
I started agitating for this in 1997 and wrote about it in 2006. The problem with the magical medium of email is that it’s an open API. Anyone with a computer can plug into it, without anyone…
·seths.blog·
Revisiting stamps for email
File Systems in Operating System - GeeksforGeeks
File Systems in Operating System - GeeksforGeeks
A Computer Science portal for geeks. It contains well written, well thought and well explained computer science and programming articles, quizzes and practice/competitive programming/company interview Questions.
·geeksforgeeks.org·
File Systems in Operating System - GeeksforGeeks