protocols   3208

« earlier    

Some notes about HTTP/3
Robert Graham from ErrataSec on QUIC aka HTTP/3:

'Google (pbuh) has both the most popular web browser (Chrome) and the two most popular websites (#1 #2 Therefore, they are in control of future web protocol development.'

Faster connection setup and latency; better bandwidth negotiation when using multiplexing; user-mode stacks by building on UDP and using recvmmsg(); and better mobile support for roaming IPs.
google  http3  quic  protocols  ip 
28 days ago by jm
Security Audits & Consulting | Least Authority
Least Authority was formed in 2011 to create freedom-compatible technologies. We are a small team who believe that freedom matters in Internet technology. You can take advantage of online services while retaining control over your own data. We're here to make it easy.
mt  consulting  audit  services  agency  protocols  blockchain  smartcontracts  source  code  freedom  review 
28 days ago by orlin
Canada doomed to be branch plant for global tech giants unless Ottawa updates thinking, Balsillie warns | Financial Post
James McLeod
November 16, 2018
7:27 PM EST

Canadian governments need to radically rethink their approach to the knowledge economy if the country is to be anything more than a branch plant for global technology giants,.......“I think they confuse a cheap jobs strategy … (and) foreign branch plant pennies with innovation billions,” .........Balsillie has argued that the “intangible” economy of data, software and intellectual property is fundamentally different from the classical industrial economy built on the trade of goods and services, and that because Canadian policymakers fail to understand that difference, they keep being taken for rubes.......Balsillie was particularly critical of the federal government’s policy when it comes to “branch plant” investments in Canada in the technology sector.

He said that in the traditional economy of goods and services, foreign direct investment (FDI) is a good thing, because there’s a multiplier effect — $100 million for a new manufacturing plant or an oil upgrader might create $300 million in spinoff economic activity.

But if you’re just hiring programmers to write software, the picture is different, he said. It’s a much smaller number of jobs with fewer economic benefits, and, more importantly, the value created through intellectual property flows out of the country.

“Our FDI approaches have been the same for the intangibles, where, when you bring these companies in, they put a half a dozen people in a lab, they poach the best talent and they poach the IP, and then you lose all the wealth effects,”....“Don’t get me wrong. I believe in open economies. They’re going to come here anyway; I just don’t know why we give them the best talent, give them our IP, give them tax credits for the research, give them the red carpet for government relations, don’t allow them to pay taxes, and then have all the wealth flow out of the country.”...if small countries such as Canada make a point of prioritizing the intangible economy, there are huge opportunities. He pointed to Israel, Finland and Singapore as examples of how smart policies and specialization can reap big rewards.

“I could literally see enormously powerful positions for Canada if we choose the right places. I mean, there are some obvious ones: value added in the food business, and precision data and IP in agriculture; certainly in energy extraction and mining, which are data and technology businesses,” he said.

“We actually have enormous opportunities to build the resilience and opportunity,” he said. ”And how can you threaten a country with a picture of a Chevy and 25 per cent tariffs when you’ve built these kinds of very powerful innovation infrastructures that you can’t stop with a tariff because they move with the click of a mouse?”
branch_plants  Canada  digital_economy  industrial_economy  intangibles  intellectual_property  Jim_Balsillie  policymakers  property_rights  protocols 
28 days ago by jerryking
Bluetooth Basics -
This tutorial aims to provide a quick overview of the Bluetooth protocol. We’ll examine the specifications and profiles that form its foundation, and we’ll go over how Bluetooth compares to other wireless protocols.
communication  protocols 
4 weeks ago by briangrimshaw Instant Messaging and the Signal Protocol - Computerphile
How do instant message apps do end to end encryption when one phone may not even be switched on yet? Dr Mike Pound on the Signal protocol at the core of most messaging apps.
instant-messaging  protocols  security  videos  encryption 
4 weeks ago by mikael
HTTP-over-QUIC to be renamed HTTP/3
Decent newsy comment thread about HTTP/3, QUIC, and how the modern internet treats IP protocols
ip  protocols  http  http3  quic  networking  internet  newsy 
4 weeks ago by jm
Deadlines, lies and videotape: The tale of a gRPC bug
HostedGraphite decided to use gRPC as an internal inter-service protocol and ran into a basic protocol bug -- it does not default to using an application-level keepalive on the TCP channel so can block indefinitely if sending-side buffers fill up. Always use application-level keepalives and don't trust TCP
tcp  protocols  keepalive  grpc  rpc  architecture  networking 
5 weeks ago by jm
Handy protocols for working with Datomic · GitHub
GitHub is where people build software. More than 28 million people use GitHub to discover, fork, and contribute to over 85 million projects.
datomic  protocols  clojure 
5 weeks ago by fmjrey

« earlier    

related tags

++  'welcomes  (iis)  (inetmgr.exe)  (msdeploy.exe).  -  1.0  1990s  2019  56k  a  activation  activitypub  administrators  affected.  agency  algorithms  also  amqp  analogy  and  any  apis  aprs  architecture  archlinux  arduino  article  articles  as  ascii  associated-types  associated  at  attacks  attention  audit  authorization  aws  bbs  be  berlin  bgp  bitcoin  bittorrent  blockchain  blog-posts  blog  branch_plants  breaks  business  c/c++  can  canada  choose  client-side  clojure  cloud  code  coding  collaboration  comms  communication  communications  compare  compliance  compsci  computing  conference  connect  constraints  consulting  content  covert.channels  criticised  crypto  cryptocurrency  cryptography  csrf  cyberspace  data  datomic  decentralized  deploy  described  design  developer  diagrams  digital_economy  disable  disabled  disabling  disciplinary  distributed_systems  documentation  dual.use  dweb  economics  editors  ega  either  electronics  elixir  embedded  enabled  encryption  events  exposure  externalities  fa  facebook  failure  fat  filesharing  firmware  for  freedom  fun  functionality  funny  gaia  game_dev  games  gcp  generic  generics  geospatial  google  gps  graphics  graphql  grpc  gsm  hacking  ham  hardware  help  history  hn  hosting  however  howitworks  howto  html  http  http2  http3  ideas  iis  image  in  indigenous-peoples  industrial_economy  information-use  information  innovation  input'  instant-messaging  intangibles  intellectual_property  internet  iot  ip  ipfs  is  jim_balsillie  json-ld  json  keepalive  keys  kinetics  knowledge  labor  lan  law  lin  linux  list  m2m  magazines  management  manager  mastodon  maximalism  may  metadata  metasploit  microchip  microservices  microsoft  mnottingham  mobile  modem  money  mouse  mqtt  mt  multimethods  mydata  network  networking  networks  newsy  node  noise  of  on  open-web  or  organization  p2p  pattern  payments  pentesting  personal_data  physics  pid  pinning  plasma  policymakers  poodle.  programming  projects  property_rights  protocol  public_goods  publish  publishing  quantum_computing  quic  radio  reading-queue  reasons  records  reduce  reference  registry  resource-identifier  rest  review  roccat  rpc  ruby  scalability  scottish  security  serial  server  service  servicenow  services  shares  situation  size  smartcontracts  social-networking  socialmedia  software  some  source  specific  specification  ssl3  stackoverflow  standards  stateful_services  stickers  storage  studio  such  summary  swift  symptom  tangles  tcp-ip  tcp  tech  technical-writing  technology  testing  that  the  through  tls  to  tools  torrents  trading  transport  triggers  tweet-threads-that-should-be-blog-posts  type  types  typically  uri  url  urns  usb  useful  using  ussd  value  verification  video  videos  vim  visual  visualization  warelogging  weaker  web  webfinger  which  writing 

Copy this bookmark: