Maglev: A Fast and Reliable Software Network Load Balancer

Maglev: A Fast and Reliable Software Network Load Balancer - Eisenbud et al. 2016 Maglev is Google's software load balancer used within all their datacenters. It offers greater scalability and availability than hardware load balancers, enables quick iteration, and is much easier to upgrade. Maglev is a just another distributed system running on the commodity … Continue reading Maglev: A Fast and Reliable Software Network Load Balancer

HyperLogLog in Practice: Algorithmic Engineering of a State of the Art Cardinality Estimation Algorithm

HyperLogLog in Practice: Algorithmic Engineering of a State of the Art Cardinality Estimation Algorithm - Heule et al. 2013 Continuing on the theme of approximations from yesterday, today's paper looks at what must be one of the best known approximate data structures after the Bloom Filter, HyperLogLog. It's HyperLogLog with a twist though - a … Continue reading HyperLogLog in Practice: Algorithmic Engineering of a State of the Art Cardinality Estimation Algorithm

MacroBase: Analytic Monitoring for the Internet of Things

MacroBase: Analytic Monitoring for the Internet of Things - Bailis et al. 2016 It looks like Peter Alvaro is not the only one to be doing some industrial collaboration recently! MacroBase is the result of Peter Bailis' collaboration with Cambridge Mobile Telematics (CMT), an IoT company. The topic at hand is analytic monitoring - detecting … Continue reading MacroBase: Analytic Monitoring for the Internet of Things

A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks

A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks - Heartfield and Loukas 2015 This paper is concerned with semantic social engineering: the manipulation of the user-computer interface to deceive a user and ultimately breach a computer system's information security. Semantic attack exploits include phishing, file masquerading (disguising file … Continue reading A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks

Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google

Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google - Bonneau et al. 2015 What was your mother's maiden name? What was your city of birth? What was the name of your first school? I don't know about you, but I always groan inwardly when a website asks such … Continue reading Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google