The legacy vulnerability of the Internet
This article documents developments over the last ten years at all layers of the network stack. It also highlights how vulnerable the current Internet is.
Read more ...Categories: technology
This article documents developments over the last ten years at all layers of the network stack. It also highlights how vulnerable the current Internet is.
Read more ...Categories: technology
This paper is a discussion around the issues faced by distributed systems when dealing with time, ordering and failures. This is particularly relevant with the work I am doing at the moment designing a very large distributed system that will need to scale massively.
Read more ...Categories: technology
This is a summary of a number of consensus algorithms currently being used in the Blockchain space. The most common at the moment is Proof of Work however this is slowly being replaced by other approaches that are more performant and don't use all the Earth's energy.
Read more ...Categories: technology
This is here for future reference - a very good set of guidelines for REST APIs.
Read more ...Categories: technology coding
There are some amazing things happening with image processing at the moment. I remember my graphics class at university 25 years ago and the primitive, by comparison to now, image processing algorithms we had to code. Oh how things have moved on.
Read more ...Categories: technology
Search