Links

Thursday 2024-09-12 Assorted Links
Assorted Links links
Published: 2024-09-12
Thursday 2024-09-12 Assorted Links

Assorted links for Thursday, September 12:

  1. noexcept affects libstdc++’s unordered_set: It may be worthwhile to investigate alternative data structure implementations like Boost.Unordered

    GNU libstdc++’s hash-based associative containers change the struct layout of their nodes depending on the noexceptness of your hash function

  2. RETINAS: Real-Time Infrastructure Accounting for Sustainability

    We are introducing a new metric – real-time server fleet utilization effectiveness —- as part of the RETINAS initiative to help reduce emissions and achieve net zero emissions across our value chain in 2030. This new metric allows us to measure server resource usage (e.g., compute, storage) and efficiency in our large-scale data center server fleet in near real-time.

  3. How Meta enforces purpose limitation via Privacy Aware Infrastructure at scale

    Privacy Aware Infrastructure (PAI) offers efficient and reliable first-class privacy constructs embedded in Meta infrastructure to address complex privacy issues. For example, we built Policy Zones that apply across our infrastructure to address restrictions on data, such as using it only for allowed purposes, providing strong guarantees for limiting the purposes of its processing.

  4. Landlock: unprivileged access control: Landlock is a userspace API provided by the Linux kernel.

    The goal of Landlock is to enable to restrict ambient rights (e.g. global filesystem or network access) for a set of processes.

  5. Intel Further Speeds Up strnlen() In The GNU C Library For Recent Intel/AMD CPUs: It’s incredible that we’re still finding performance improvements in venerable functions like strlen().
Tuesday 2024-09-10 Assorted Links
Assorted Links links
Published: 2024-09-10
Tuesday 2024-09-10 Assorted Links

Assorted links for Tuesday, September 10:

  1. Visualizing boost::unordered_map in GDB, with pretty-printer customization points
  2. Is Telegram really an encrypted messaging app?

    From your perspective as a user, an “encrypted messenger” ensures that each time you start a conversation, your messages will only be readable by the folks you intend to speak with… Telegram clearly fails to meet this stronger definition for a simple reason: it does not end-to-end encrypt conversations by default. If you want to use end-to-end encryption in Telegram, you must manually activate an optional end-to-end encryption feature called “Secret Chats” for every single private conversation you want to have.

  3. Threat Monitoring: Best Practices for Security
  4. FUSE Adding IDMAPPED Mounts Support In Linux 6.12
  5. Australia Threatens to Force Companies to Break Encryption
Monday 2024-09-09 Assorted Links
Assorted Links links
Published: 2024-09-09
Monday 2024-09-09 Assorted Links

Assorted links for Monday, September 9:

  1. A Guide to Managed Backup and Disaster Recovery
  2. Continuous reinvention: A brief history of block storage at AWS

    While the much celebrated ideal of a “full stack engineer” is valuable, in deep and complex systems it’s often even more valuable to create cohorts of experts who can collaborate and get really creative across the entire stack and all their individual areas of depth.

  3. Untangling Lifetimes: The Arena Allocator
  4. Governing data products using fitness functions

    Fitness functions are a powerful automated governance technique we’ve applied to data products within the context of a Data Mesh. Since data products serve as the foundational building blocks (architectural quanta) of a data mesh, ensuring robust governance around them significantly increases the chances of a successful data mesh transformation.

  5. Honey, I shrunk {fmt}: bringing binary size to 14k and ditching the C++ runtime
Friday 2024-08-30 Assorted Links
Assorted Links links
Published: 2024-08-30
Friday 2024-08-30 Assorted Links

Assorted links for Friday, August 30:

  1. Reimplementing A Linux Rust Scheduler In eBPF Shows Very Promising Results

    In conclusion, prototyping new schedulers in user-space using Rust and then re-implementing them in BPF can be an effective workflow for designing new specialized schedulers.

  2. Introducing Docker Build Checks: Optimize Dockerfiles with Best Practices
  3. Docker Scout Health Scores: Security Grading for Container Images in Your Docker Hub Repo
  4. 50 Years of Queries

    A discussion of the evolution of the database industry over the last half century, and why the relational database concepts introduced by E. F. Codd have proven so resilient over several decades.

  5. Operational and Analytic Data Cycles

    The relationship between operational and analytic data systems, and the challenges facing their implementation and management.

Wednesday 2024-08-28 Assorted Links
Assorted Links links
Published: 2024-08-28
Wednesday 2024-08-28 Assorted Links

Assorted links for Wednesday, August 28:

  1. How Meta animates AI-generated images at scale
  2. New AI algorithm flags deepfakes with 98% accuracy — better than any other tool out there right now
  3. More than 100K sites impacted by Polyfill supply chain attack – An important way to protect your supply chain is to lock your dependency to a specific version + hash (e.g. SHA256). This way the dependency can’t be backdoored without you detecting it.
  4. Providing Security Updates to Automobile Software
  5. NIST Releases First Post-Quantum Encryption Algorithms
Tuesday 2024-08-27 Assorted Links
Assorted Links links
Published: 2024-08-27
Tuesday 2024-08-27 Assorted Links

Assorted links for Tuesday, August 27:

  1. Semantic Router using Azure AI Search
  2. The ultimate guide to developer happiness: Five actionable tips and strategies to supercharge developer happiness—and a more innovative workplace.
  3. Introducing the Azure AI Inference SDK: Access More AI Models with the Azure AI Model Catalog
  4. What are AI agents and why do they matter?
  5. Found means fixed: Secure code more than three times faster with Copilot Autofix