aruntt’apxsmawa munat kullaka, I am currently playing around with HTTP/2 and trying to figure out if and what performance benefits it brings. One interesting feature I found is the possibility to push data from the…
Category: Weekly CS Paper
It gets even quicker, faster sorting with Pattern-defeating Quicksort
សួស្តីជាទីស្រឡាញ់, this is a classic computer science bachelor topic: Sorting algorithms, implementing them and in the figuring out that Quicksort is the fastest you can get (by divide-n-conquer). Hence, it amazed me to find out…
Read more of It gets even quicker, faster sorting with Pattern-defeating Quicksort
Making WordPress faster the hardcore way: Optimizing Memcached with in-kernel caching
nyob zoo tus hlub, in my blog I am cheating a little for performance as I have heavy Cloudflare caching in front of it, but the default optimization for WordPress is using Memcached, a widely…
Read more of Making WordPress faster the hardcore way: Optimizing Memcached with in-kernel caching
How to detect an SSL Man-in-the-middle attack
Привіт Люба this week’s paper by Facebook Research is a bit dated (2014) as you also feel when reading through it (as it uses Flash Player as research ground), but nevertheless I learned quite a…
How to process real-time data at large scale with online(streaming) MapReduce
Kaixo maitea, this week’s paper is about the handling of data at scale. And for that the MapReduce framework was invented, which gives a nice abstraction for working on data without caring about the underlying…
Read more of How to process real-time data at large scale with online(streaming) MapReduce
Killing the internet – Maestro a novel Link Flooding Attack against a BGP nodes
hallo Liefling, As you might have figured by now, I love research about large scale Internet attacks and this week’s paper is again in that area. The paper presents a novel way on how to…
Read more of Killing the internet – Maestro a novel Link Flooding Attack against a BGP nodes
Ship your firewall rules with your application using eBPF
silav delalê, this week’s paper is a classic again: How to use eBPF to enhance network package filtering in Linux. The authors discuss two use cases for eBPF and also provide example code, so you…
Read more of Ship your firewall rules with your application using eBPF
Generate cats out of nowhere with using generative adversarial networks (GANs)
chào anh yêu, this week’s paper will help you to generate as many cat images you need for your internet-memes. Jokes aside, with generative adversarial networks (GANs) we are able to train an ML network…
Read more of Generate cats out of nowhere with using generative adversarial networks (GANs)
Keeping the hackers out: 14 different methods to prevent account hijacking
Buna draga, traveling to another country, you might have faced it before: The anti-account-hijacking systems implemented by the various online providers. There is a wide range from entering your “secret” email address, double verifying via…
Read more of Keeping the hackers out: 14 different methods to prevent account hijacking
If we fly to Mars, we will bring our file system with us. IPFS, the distributed Inter Planetary File System
សួស្តីជាទីស្រឡាញ់, I am currently playing around with IPFS in a little weekend project and wanted to understand more about the inner workings of this peer to peer distributed file system. Especially how it differs in…