The legacy vulnerability of the Internet
This article documents developments over the last ten years at all layers of the network stack. It also highlights how vulnerable the current Internet is.
This article documents developments over the last ten years at all layers of the network stack. It also highlights how vulnerable the current Internet is.
A simple change in message can lead to a big impact.
This paper is a discussion around the issues faced by distributed systems when dealing with time, ordering and failures. This is particularly relevant with the work I am doing at the moment designing …
This is a summary of a number of consensus algorithms currently being used in the Blockchain space. The most common at the moment is Proof of Work however this is slowly being replaced by other …
This is here for future reference - a very good set of guidelines for REST APIs.
There are some amazing things happening with image processing at the moment. I remember my graphics class at university 25 years ago and the primitive, by comparison to now, image processing …
There is a video of a demonstration given by Doug Engelbart in 1968 which is commonly referred to as “The Mother Of All Demos”. In the demo, he demonstrates a lot of technologies for the …
I am fortunate with my current role that I am able to work 2-3 days per week from home. This saves me about 2.5 hours of commuting time per day as well as about £2000 per year.
Took me a little while to get into this book. It starts out in a school where a pupil spots a spaceship from his favourite video game. This then moves on to it being a precursor to an invasion by the …
I have been very fortunate in my career to have some exceptional bosses that have had a massive impact on my career.