You can use a filter of larger-than:1 to hide all requests that returned less than 1 byte. When I tested this, requests served from the cache have (from cache) in the size column and are excluded by this filter. Negating it showed only cache cachedrequests.
Wow what a week! After leaving Switzerland on Tuesday I made it to Verona Italy by train where I had the chance to attend JSDay and speak at PHPDay. I am astonished how much work the organisation Team behind those Conferences puts in – They not only run JS- and PHPDay they even branched out into Devops, Containers, React and much more. Way to go! It was a smooth experience and I had tons of fun and learned a lot during the conference.
Leading Edge Forum’s Simon Wardley, never one to mince words, helps to parse what a 70 per cent (or 44 per cent) lead means: “Let me translate that for you. Amazon is currently positioned to own 70 per cent of the future of ALL software.” Developers, for their part, happily focus on writing business logic while AWS (or Microsoft/Google) handle all the server infrastructure. As Matt Wood, AWS general manager of Deep Learning and AI, told me: “With S3, DynamoDB, and Lambda, you can build apps without thinking about the underlying infrastructure.”
Just let that sink in for a minute, shall we? I’m very happy that there are alternatives to the walled gardens that seem to be oh-so-confortable.
Walmart has just filed a patent for autonomous, robot bees. Yes, that Walmart — and no, you didn’t slip into another, stranger dimension. The mega-corporation’s patent specifically covers “pollination drones.” These tiny robots could act just like bees, pollinating crops autonomously.
Buttons are everywhere. Elevator buttons, machinery buttons, and even “Nuclear Button” that sits on the President’s office desk. But are you always sure the button you push really performs what you want it to do?
Apparently, iOS stores information about the date and time the device was last unlocked or had a data connection to a USB port. After the seven days elapse, the Lightning port will be disabled. Once this happens, you will no longer be able to pair the device to a computer or USB accessory, or use an existing lockdown record, without unlocking the device with a passcode. The only thing you’ll be able to do is charging.
A good move! Wondering when Google draws level disabling the USB ports after a while.
The idea was born for a simple reason: While I love going to meetups, barcamps and conferences, I don’t like going on my own when I don’t know anyone. Even the thought is intimidating. And I can’t be the only one, right?
A thing we talked about at PHPDays Verona during the past week. Great initiative!
Still on RSS. Never went away from it… even if it feels a bit oldscool. Own your content.
Now, in U.S. v. Kolsuz, the first appellate ruling since Riley, the Fourth Circuit appeals court has held that it is unconstitutional for US border officials to subject visitors devices to forensic searches without individualized suspicion of criminal wrongdoing.
We build prototype hardware and implement all four 802.11b bit rates on an FPGA platform. Our experimental evaluation shows that passive Wi-Fi transmissions can be decoded on off-the-shelf smartphones and Wi-Fi chipsets over distances of 30–100 feet in various line-of-sight and through-the-wall scenarios. Finally, we design a passive Wi-Fi IC that shows that 1 and 11 Mbps transmissions consume 14.5 and 59.2 µW respectively. This translates to 10000x lower power than existing Wi-Fi chipsets and 1000x lower power than Bluetooth LTE and ZigBee.
Well, it depends. If you got your start programming in the 90s, you’d say I just defined a Service-Oriented Architecture (SOA). But, if you’re younger and cut your developer teeth on the cloud, you’d say: “Oh, you’re talking about microservices.”
Serverless, Microservices – Isn’t that all just SOA?
Four years ago, Ars Technica wrote a detailed analysis of using Android without all the proprietary Google software. It wasn’t a great experience, as you can probably guess. But plenty can change in four years, so is the situation any better in 2018? That’s what I wanted to find out.
If you want to go Google-Free that’s a good article here!
Since triggering a bit flip requires hundreds of thousands of memory accesses to specific DRAM locations within tens of milliseconds, a successful Throwhammer attack would require a very high-speed network of at least 10Gbps. In their experimental setup, researchers achieved bit flips on a targeted server after accessing its memory 560,000 times in 64 milliseconds by sending packets over LAN to its RDMA-enabled network card.
Nerdy, i know but Rowhammer attacks are intersting!
To further limit groundwater flow into reactors buildings, TEPCO actually froze the ground around them, creating a kind of frozen wall down to a depth of about 30 meters. Approximately 1,500 meters long, the wall is kept frozen by pipes filled with an aqueous solution of calcium chloride cooled to -30ºC. Freezing commenced in March 2016 and is now “99 percent complete,” according to Kohta.
Just one piece in the puzzle of cleaning up the Aftermath of Fukushima – And yes it’s already 7 years since the accident happened.
More Serverless! After two inspiring days of attending the JSDay, I had the chance to talk about the concepts around the serverless movement and our approach to it at PHPDay. It’s been a while since my last PHPDay/JSDay and the conference is still as welcoming and nice as I had it in my memory. (Just that I completely forgot about the fabulous strong Italian coffee ) Thank you for having me!
I was given the huge oportunity to talk about serverless and how infrastructure evolves over time at the annual Web à Quebéc. A huge thanks already goes out to the team that organizes the conference. It’s a blast to see so many dedicated people investing their spare time into such a massive conference! Merci a tous!
Soso Verschlüsselung ist ein hochgradig konspiratives Vorgehen, wenn man den deutschen Behörden zuhört:
Die Behörden scheinen Probleme zu haben, an die Informationen der bei Razzien beschlagnahmten Computer zu gelangen. Die Daten waren verschlüsselt und es wurden sichere Mailadressen verwendet. Ob die Rechner inzwischen geknackt wurden, wollte das Innenministerium auf Anfrage der taz nicht bestätigen. Doch bereits den Einsatz von Verschlüsselungstechnologien wertete das BMI als problematisch. Es zeige ein „hochgradig klandestines und konspiratives“ Vorgehen, wie aus der Verbotsverfügung des Innenministeriums hervorgeht.