並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 11 件 / 11件

新着順 人気順

point to point protocol in computer networksの検索結果1 - 11 件 / 11件

  • RFC 9562: Universally Unique IDentifiers (UUIDs)

     Internet Engineering Task Force (IETF) K. Davis Request for Comments: 9562 Cisco Systems Obsoletes: 4122 B. Peabody Category: Standards Track Uncloud ISSN: 2070-1721 P. Leach University of Washington May 2024 Universally Unique IDentifiers (UUIDs) Abstract This specification defines UUIDs (Universally Unique IDentifiers) -- also known as GUIDs (Globally Unique IDentifiers) -- and a Uniform Resou

      RFC 9562: Universally Unique IDentifiers (UUIDs)
    • How Does BlueSky Work?

      Home Blog 2024-02-24 One of the reasons I am enthusiastic about BlueSky is because of the way that it works. So in this post, I am going to lay out some of the design and the principles behind this design, as I understand them. I am not on the BlueSky team, so these are my takes only. Let’s begin. Why does BlueSky exist? Here’s what the BlueSky Website says right now: Social media is too important

      • It's always TCP_NODELAY. Every damn time. - Marc's Blog

        About Me My name is Marc Brooker. I've been writing code, reading code, and living vicariously through computers for as long as I can remember. I like to build things that work. I also dabble in machining, welding, cooking and skiing. I'm currently an engineer at Amazon Web Services (AWS) in Seattle, where I work on databases, serverless, and serverless databases. Before that, I worked on EC2 and

        • HuggingFaceFW/fineweb · Datasets at Hugging Face

          "},"dump":{"kind":"string","value":"CC-MAIN-2013-20"},"url":{"kind":"string","value":"http://%20jwashington@ap.org/Content/Press-Release/2012/How-AP-reported-in-all-formats-from-tornado-stricken-regions"},"date":{"kind":"string","value":"2013-05-18T05:48:54Z"},"file_path":{"kind":"string","value":"s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-

            HuggingFaceFW/fineweb · Datasets at Hugging Face
          • The day my ping took countermeasures

            Once my holidays had passed, I found myself reluctantly reemerging into the world of the living. I powered on a corporate laptop, scared to check on my email inbox. However, before turning on the browser, obviously, I had to run a ping. Debugging the network is a mandatory first step after a boot, right? As expected, the network was perfectly healthy but what caught me off guard was this message:

              The day my ping took countermeasures
            • DDoS threat report for 2023 Q2

              This post is also available in Français, 繁體中文, 한국어, Deutsch, 简体中文, 日本語, Português, Español. Welcome to the second DDoS threat report of 2023. DDoS attacks, or distributed denial-of-service attacks, are a type of cyber attack that aims to disrupt websites (and other types of Internet properties) to make them unavailable for legitimate users by overwhelming them with more traffic than they can handl

                DDoS threat report for 2023 Q2
              • RFC 9446: Reflections on Ten Years Past the Snowden Revelations

                RFC 9446 Reflections on Ten Years Past the Snowden Revelations Abstract This memo contains the thoughts and recountings of events that transpired during and after the release of information about the United States National Security Agency (NSA) by Edward Snowden in 2013. There are four perspectives: that of someone who was involved with sifting through the information to responsibly inform the pub

                • Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence | The White House

                  Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows: Section 1.  Purpose.  Artificial intelligence (AI) holds extraordinary potential for both promise and peril.  Responsible AI use has the potential to help sol

                  • Different Types of Cryptocurrencies: Bitcoin, altcoin, and tokens

                    I still remember the days when I could count the various types of cryptocurrencies available. But this is certainly not the case as of today. The crypto market has grown exponentially. These different types of Crypotos have been coming up to solve different use cases or pain points. The underlying technology of cryptocurrency is blockchain. Cryptocurrencies are a relatively new type of money. A cr

                      Different Types of Cryptocurrencies: Bitcoin, altcoin, and tokens
                    • Backdoor in XZ Utils That Almost Happened - Schneier on Security

                      Last week, the Internet dodged a major nation-state attack that would have had catastrophic cybersecurity repercussions worldwide. It’s a catastrophe that didn’t happen, so it won’t get much attention—but it should. There’s an important moral to the story of the attack and its discovery: The security of the global Internet depends on countless obscure pieces of software written and maintained by e

                      • How to Kill a Decentralised Network (such as the Fediverse)

                        by Ploum on 2023-06-23 The year is 2023. The whole Internet is under the control of the GAFAM empire. All of it? Well, not entirely. Because a few small villages are resisting the oppression. And some of those villages started to agregate, forming the "Fediverse". With debates around Twitter and Reddit, the Fediverse started to gain fame and attention. People started to use it for real. The empire

                          How to Kill a Decentralised Network (such as the Fediverse)
                        1