Saving an older twitter thread on Ceph.
So a few days ago, somebody found an exploit in beep - now
Hashes and their uses
we have been talking about hash functions in general, and
cryptographic hashes in particular. We wanted four things from
A hash function is a function that maps a large number of arbitrary data
types onto a smaller number of contiguous integers.
Intel finally published a whitepaper about Spectre #2 Mitigation. The
is also featured on
Hacker News. It’s a technical
whitepaper, but you can see the footprints of lawyers all over the
language. For me, it basically says that, yes, Retpolines are indeed
incompatible with Controlflow Enforcement Technology (CET) that Intel
was planning for later CPUs
El Reg article).
Yesterday, Booking.com hosted the Open Compute Meetup in
Amsterdam. My talk is on Slideshare and a recording is on
There is a very useful and interesting article by Chris Down:
“In defence of swap: common misconceptions”.
What does your Mac do on Startup? Knockknock knows.
Melvin Conway is a compiler
developer and systems designer, who is well known for the eponymous
Conway’s Law. Various
phrasings exist of that, and one popular is
»I COULD HAVE BECOME a mass murderer after I hacked my governor
module, but then I realized I could access the combined feed of
entertainment channels carried on the company satellites.«