article thumbnail

Wireless attacks on aircraft instrument landing systems

The Morning Paper

Wireless attacks on aircraft instrument landing systems Sathaye et al., Today’s paper is a good reminder of just how important it is becoming to consider cyber threat models in what are primary physical systems, especially if you happen to be flying on an aeroplane – which I am right now as I write this!

article thumbnail

Stuff The Internet Says On Scalability For March 22nd, 2019

High Scalability

Let them dogfood the software patch. skamille : I worry that the cloud is just moving us back to a world of proprietary software. µs of replication latency on lossy Ethernet, which is faster than or comparable to specialized replication systems that use programmable switches, FPGAs, or RDMA.". We achieve 5.5

Internet 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Brendan@Intel.com

Brendan Gregg

These were the opening words of my 2019 [AWS re:Invent talk], which I followed by demonstrating rapid on-the-fly dynamic instrumentation of the Intel wireless driver. The question was: Which cloud should I make number one?

Wireless 145
article thumbnail

From Idea to Reality: The Journey of Developing a Smart Home App

Tech News Gather

Once the new smart-home connectivity standard is released, all firms interested in selling Matter goods will have access to an official rating system. How does a home automation system work? In order to work as intended, the various parts of a home automation system need to be able to communicate with one another.

article thumbnail

Fallacy #5: Topology doesn't change

Particular Software

You create a new server with the same software and add it to the load balancer. From Udi Dahan's Advanced Distributed Systems Design Course , Day 1 Embrace change The only constant in the universe is change. Some protocols can run afoul of this changing topology — even something simple, like a wireless client disconnect.

article thumbnail

Ginseng: keeping secrets in registers when you distrust the operating system

The Morning Paper

Ginseng: keeping secrets in registers when you distrust the operating system Yun & Zhong et al., Suppose you did go to the extreme length of establishing an unconditional root of trust for your system, even then, unless every subsequent piece of code you load is also fully trusted (e.g., NDSS’19.

article thumbnail

Brendan@Intel.com

Brendan Gregg

These were the opening words of my 2019 AWS re:Invent talk , which I followed by demonstrating rapid on-the-fly dynamic instrumentation of the Intel wireless driver. The question was: Which cloud should I make number one?