並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 9 件 / 9件

新着順 人気順

point to point protocol in computer networksの検索結果1 - 9 件 / 9件

  • RFC 9562: Universally Unique IDentifiers (UUIDs)

     Internet Engineering Task Force (IETF) K. Davis Request for Comments: 9562 Cisco Systems Obsoletes: 4122 B. Peabody Category: Standards Track Uncloud ISSN: 2070-1721 P. Leach University of Washington May 2024 Universally Unique IDentifiers (UUIDs) Abstract This specification defines UUIDs (Universally Unique IDentifiers) -- also known as GUIDs (Globally Unique IDentifiers) -- and a Uniform Resou

      RFC 9562: Universally Unique IDentifiers (UUIDs)
    • How Does BlueSky Work?

      Home Blog 2024-02-24 One of the reasons I am enthusiastic about BlueSky is because of the way that it works. So in this post, I am going to lay out some of the design and the principles behind this design, as I understand them. I am not on the BlueSky team, so these are my takes only. Let’s begin. Why does BlueSky exist? Here’s what the BlueSky Website says right now: Social media is too important

      • It's always TCP_NODELAY. Every damn time. - Marc's Blog

        About Me My name is Marc Brooker. I've been writing code, reading code, and living vicariously through computers for as long as I can remember. I like to build things that work. I also dabble in machining, welding, cooking and skiing. I'm currently an engineer at Amazon Web Services (AWS) in Seattle, where I work on databases, serverless, and serverless databases. Before that, I worked on EC2 and

        • Modern Approaches to Network Access Security

          This document is distributed as TLP:CLEAR. Disclosure is not limited. Sources may use TLP:CLEAR when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules. TLP:CLEAR information may be distributed without restrictions. For more information on the Traffic Light Protocol, see cisa.gov/t

          • Nostr and ATProto - Shreyan Jain

            This post could’ve been titled “Nostr vs ATProto”, but that really isn’t what I wanted to do here. While I will be comparing and contrasting them a lot, and that’s kind of even the point of writing this, I didn’t want to really pit the two against each other at all, and especially not with the title. I also want to try avoiding commenting on the differences between the communities that have formed

            • HuggingFaceFW/fineweb · Datasets at Hugging Face

              "},"dump":{"kind":"string","value":"CC-MAIN-2013-20"},"url":{"kind":"string","value":"http://%20jwashington@ap.org/Content/Press-Release/2012/How-AP-reported-in-all-formats-from-tornado-stricken-regions"},"date":{"kind":"string","value":"2013-05-18T05:48:54Z"},"file_path":{"kind":"string","value":"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-

                HuggingFaceFW/fineweb · Datasets at Hugging Face
              • Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence | The White House

                Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows: Section 1.  Purpose.  Artificial intelligence (AI) holds extraordinary potential for both promise and peril.  Responsible AI use has the potential to help sol

                • Different Types of Cryptocurrencies: Bitcoin, altcoin, and tokens

                  I still remember the days when I could count the various types of cryptocurrencies available. But this is certainly not the case as of today. The crypto market has grown exponentially. These different types of Crypotos have been coming up to solve different use cases or pain points. The underlying technology of cryptocurrency is blockchain. Cryptocurrencies are a relatively new type of money. A cr

                    Different Types of Cryptocurrencies: Bitcoin, altcoin, and tokens
                  • Backdoor in XZ Utils That Almost Happened - Schneier on Security

                    Last week, the Internet dodged a major nation-state attack that would have had catastrophic cybersecurity repercussions worldwide. It’s a catastrophe that didn’t happen, so it won’t get much attention—but it should. There’s an important moral to the story of the attack and its discovery: The security of the global Internet depends on countless obscure pieces of software written and maintained by e

                    1