Self-Admitted Technical Debt · It Will Never Work in Theory
System Architecture
The quantum state of a TCP port
If I navigate to https://blog.cloudflare.com/, my browser will connect to a remote TCP address from the local IP address assigned to my machine, and a randomly chosen local TCP port. What happens if I then decide to head to another site?
Your Blueprint to Building Reliable Data Infrastructure With Open-Source
The paradox of choice is real when it comes to setting up your data infrastructure. The modern data stack has more options than ever…
Swift Codable Protocol: An Introduction
The Swift programming language is known for its easy-to-use and efficient syntax. One of its most powerful features is the Codable…
XOR gate - Wikipedia
Weird programming operators: Elvis, Walrus, Spaceship, and Turbofish!
Programmers are really ingenious fellows who love coming up with weird names. Today I want to tell you about some of the most curious names…
How to write software that will keep working for decades without problems
Cybersecurity Math
CM.1 How you can use math to reconcile cybersecurity
cr.yp.to
Introduction to Software Architecture with Actors: Part 5 — On Fragmented Systems
Fragmented architectures: Mesh (Service Mesh, Space-Based Architecture), Service-Oriented Architecture, Hierarchy (Cell-Based…
Meta Pseudo Labels (MPL) Algorithm
AI-ContentLab is an artificial intelligence technical content provider, focused on delivering high-quality article, tutorials, and blog posts
Dropping Packets From Unikernels
For quite some time now ops has auto-generated firewall rules for various cloud providers such as GCP and AWS. In this tutorial we learn how to implement a network firewall in the Nanos unikernel through simple configuration.
Generic iterators for BPF
BPF programs destined to be loaded into the kernel are generally written in
C but, increasingly, the environment in which those programs run differs
significantly from the C environment. The BPF virtual machine and
associated verifier make a growing set of checks in an attempt to make BPF
code safe to run. The proposed addition of an iterator mechanism to BPF
highlights the kind of features that are being added — as well as the
constraints placed on programmers by BPF.
Defining DORA-Like Metrics for Security Engineering
With operational availability now essentially publicly available, security is capable of much the same thing focusing on velocity and safety.
Intro to Content Defined Chunking
Building a basic search experience with Postgres
Building search functionality in products is a common task. Many solutions exist to solve this problem already. OpenSource tools like opensearch and mellisearch are some examples that are very commonly used. Using a 3rd party tool to build a “full-text search” is a good bet if you have a lot of data (i.e. a lot of users).
The goal of this post is to have a look at some in-built tools to build a minimalist search feature when your data is backed by a Postgres (or any SQL) database.
The workload-first approach to CPU innovation
Sponsored Post: As in so many other aspects of life, not all compute workloads are created equal – they need a more subtle approach to getting the best
Why Audit Logs Are Important
Administrators and compliance teams can use audit logs to investigate user actions, spot suspect activity and adhere to regulatory frameworks.
Zero-copy I/O for ublk, three different ways
The ublk subsystem enables the creation of
user-space block drivers that communicate with the kernel using io_uring. Drivers implemented this way show
some promise with regard to performance, but there is a bottleneck in the
way: copying data between the kernel and the user-space driver's address
space. It is thus not surprising that there is interest in implementing
zero-copy I/O for ublk. The mailing lists have recently seen three
different proposals for how this could be done.
Rules as code for more responsive governance
Using rules
as code to help bridge the gaps between policy creation, its
implementation, and its, often unintended, effects on people was the
subject of a talk by
Pia Andrews on the first day of the inaugural
Everything Open conference in Melbourne, Australia. She
has long been exploring the space of open government,
and her talk was a report on what
she and others have been working on
over the last seven years. Everything Open is the successor
to the
long-running, well-regarded linux.conf.au (LCA); Andrews (then Pia Waugh) gave the opening keynote at LCA 2017 in
Hobart, Tasmania, and helped organize the 2007 event in Sydney.
Four things you should know about Rules as Code
7 Hardware Devices for Edge Computing Projects in 2023
Edge computing can ensure things keep functioning when reliability is vital and network connectivity can’t be guaranteed.
Visible APIs get reused, not reinvented
How open API specifications can help developers—and computers—understand your APIs.
FLEDGE - Chrome Developers
A proposal for on-device ad auctions to choose relevant ads from websites a user has previously visited, designed so it cannot be used by third parties to track user browsing behavior across sites.
Partnering with Fastly—Oblivious HTTP relay for FLEDGE's 𝑘-anonymity server - Chrome Developers
We are improving Chrome’s privacy measures by partnering with Fastly to implement the 𝑘-anonymity server for FLEDGE. With data being relayed through an OHTTP relay in this implementation, Google servers do not receive the IP addresses of end users. The 𝑘-anonymity server is an incremental step towards the full implementation of FLEDGE.
You can now run a GPT-3 level AI model on your laptop, phone, and Raspberry Pi
Thanks to Meta LLaMA, AI text models have their "Stable Diffusion moment."
VEX: Standardization for a Vulnerability Exploit Data Exchange Format
VEX documents, a companion to software bills of materials (SBOMs), describe how and whether a piece of software is affected by a certain vulnerability.
Building a Media Understanding Platform for ML Innovations
The media understanding platform serves as an abstraction layer between Machine Learning (ML) algos and various applications.
DOE Wants A Hub And Spoke System Of HPC Systems
We talk about scale a lot here at The Next Platform, but there are many different aspects to this beyond lashing a bunch of nodes together and counting
Time is Code, my Friend
For several years, the fast startup time of an application or service in Java has been a highly discussed topic. According to the authors of numerous articles, it seems if you don’t apply som…