Links
AddWhen I was a kid, my sister and I had a tower of VHS tapes we watched endlessly. Fast-forward to today, and my children's movie collection is vastly different. It's completely digital and dispersed across services. I wanted to recreate the tangibl...
skarnet.org: a word about systemd
The current sky at your approximate location, rendered as a CSS gradient. Refreshes every minute using the meta http-equiv="Refresh" tag. Created for HTML Day 2025.
“What is the easiest way to securely connect tens of thousands of computers, hosted at multiple cloud service providers in dozens of locations around the globe?” If you want our answer, it’s Nebula, but I recommend that you read the rest of this short post before clicking that shiny link. At Slack, we asked ourselves this…
Create systems that allow you to be consistently productive
Today, the National Institute of Standards and Technology (NIST) announced the first standardization of three cryptography schemes that are immune against the threat of quantum computers, known as post-quantum cryptography (PQC) schemes. With these standards, NIST is encouraging computer system administrators to transition as soon as possible.
The NNSA has unveiled El Capitan, the world's most powerful supercomputer, at the SC Conference. Housed at Lawrence Livermore National Laboratory, El Capitan can perform over 2700 quadrillion operations per second. It will be used to model nuclear weapon performance, aging effects, and safety, as well as inertial confinement fusion and AI training.
In an interview with Rachel Plotnick, delve into the past and present of tactile controls. As touchscreens dominate, we examine the current trend shifting back to physical buttons, and why users crave the familiar feel of buttons, knobs, and switches in their devices and interfaces.
Researchers have developed a hybrid technology that would combine Wi-Fi with the Long Range (LoRa) networking protocol, yielding a new long-distance wireless concept called WiLo. The international research team has developed their proposed WiLo tech to be used on existing Wi-Fi and LoRa hardware.
Read how Google is using System Theoretic Process Analysis (STPA) to analyze pure software systems and discover risks.
A technical overview of SAML works, and how it fits into your product and your customer's business
Recently I was doing an assessment in a locked down and restricted environment. One of the first actions you tend to do when landing a shell on a [linux] box is to do some reconnaissance. This is both on host and network, as you want to determine what new access this host has given you. Normally you would run netstat, ifconfig, ip route etc to determine if the compromised host is connected to any other hosts and to determine if there are other network segments you do not know about.
Simple dashboard built for viewing pipeline metrics in AWS. Built using CloudWatch dashboards and metrics populated from CloudWatch events that CodePipeline triggers. Read more...
We invent groundbreaking, original toys that fascinate, delight, and educate.