Apple's implementation of Low Latency HLS Explained
At WWDC2019, Apple has taken the wraps of its implementation of Low-Latency HLS streaming.
This article discuss what Apple done to reduce publishing latency, eliminate segment round trip, reduce playlist transfer overhead
and switch tiers quickly.
Reverse Engineering of a Not-so-Secure IoT Device
This article uses an example of an IoT monitoring/sensor device. The device had been deployed in shared rooms (e.g. meeting rooms) as well placed under the desk of individual employees. This article describes the investigation and analysis of that device, the possible problems along with proposed improvement
Zanzibar: Google’s Consistent, Global Authorization System
This paper presents the design, implementation, and deployment
of Zanzibar, a global system for storing and evaluating access control lists. It has maintained 95th-percentile latency of less than 10 milliseconds and availability of greater than 99.999% over 3 years of production use.
Extract critical CSS
The browser must download and parse CSS files before it can show the page, which makes CSS a render-blocking resource.
Critical CSS is a technique that extracts the CSS for above-the-fold content in order to render content to the user as fast as possible.
Practical Deep Learning for Coders, v3
A Free course where they take us step by step for all deep learning stuff. A skill where many backend/frontend dev consider blackbox to them. You will need a computer with GPU, they have steps to help you launch these server in Google or Azure use free-tier.
Hack The Box
With a new company get hack or data breach every day, improving your skill in security is a must. This give you servers where you can
BRIN index in Postgres
the idea of BRIN is to avoid looking through definitely unsuited rows rather than quickly find the matching ones. This is always an inaccurate index: it does not contain TIDs of table rows at all.
Protect our Git Repos, Stop Foxtrot
A foxtrot merge is a specific sequence of git commits. A particularly nefarious sequence. Their graph looks like step of
Foxtrot dance thus the name. They makes history mess up
Code to read
Inspects source code for security problems by scanning the Go AST.
🌸 HTTP REST API caching middleware, to be used between load balancers and REST API workers
an AWS Lambda auditing tool designed to create asset visibility and provide actionable results.
helps you deal with all your remote or cloud-native infrastructure using the UNIX-y patterns and tools you already know and love.
a fast serverless framework for Kubernetes with a focus on developer productivity and high performance
Find files with SQL-like queries
Sane database change management. Support Postgres and MySQL.
a minimal and free Kubernetes distribution.
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this