Mining your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Mining your Ps and Qs: Detection of Widespread Weak Keys in Network Devices - Heninger et al. 2012 This paper definitely wins the 'best pun in a paper title' prize. P and Q here refer to the factors that are multiplied together when generating your public and private key pairs. As for the mining? It … Continue reading Mining your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google’s Datacenter Network

Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google's Datacenter Network - Singh et. al (Google) 2015 Let's end the week with something completely different: a look at ten years and five generations of networking within Google's datacenters. Bandwidth demands within the datacenter are doubling every 12-15 months, even faster than the … Continue reading Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google’s Datacenter Network

Out of the Fire Swamp – Part III, Go with the flow.

Go with the flow At the conclusion of Part II we introduced the notion of a (micro)service owning exclusive access to a set of data in order to manage application invariants. Once we start to break things down this way, we need to start thinking about the flow of data between microservices. A better paradigm? … Continue reading Out of the Fire Swamp – Part III, Go with the flow.

Out of the Fire Swamp – Part II, Peering into the mist

Peering into the mist In Part I we examined the data crisis, accepted that anomalies are inevitable, and realized the central importance of the application. But what should we do about it? Here I'm peering into the mist and speculating about a way forward, navigating via the signposts that the database research community has put … Continue reading Out of the Fire Swamp – Part II, Peering into the mist

Out of the Fire Swamp* – Part I, ‘The Data Crisis’

(*) with apologies to Moseley, Marks, and Westley. Something a little different to the regular paper reviews for the next three days. Inspired by yesterday's 'Consistency without Borders,' and somewhat dismayed by what we learned in 'Feral Concurrency Control', I'm going to attempt to pull together a bigger picture, to the extent that I can … Continue reading Out of the Fire Swamp* – Part I, ‘The Data Crisis’

Feral Concurrency Control: An Empirical Investigation of Modern Application Integrity

Feral Concurrency Control: An Empirical Investigation of Modern Application Integrity - Bailis et al. 2015 This paper is an absolute joy to read: seasoned database systems researchers conduct a study of real-world applications from the Ruby community and try not to show too much disdain at what they find, whilst pondering what it might all … Continue reading Feral Concurrency Control: An Empirical Investigation of Modern Application Integrity