Confidential Computing

pWith confidential computing we want to guarantee confidentiality and integrity of a user’s computation running on a remote (cloud) system, including: The program Its inputs and outputs Intermediate state, control flow, etc. Even if do not trust the cloud provider ! Usually it…

June 3, 2025 · Reading Time: 6 minutes · By Xuanqiang Angelo Huang

Container Virtualization

Containers # In this note, we introduce the famous docker containers. We also explore how #Linux Containers are implemented, and some parts of how #Docker works. What is a Container # We have explored Virtual Machines in some past section. Containers do not virtualize…

June 3, 2025 · Reading Time: 6 minutes · By Xuanqiang Angelo Huang

Content Delivery Networks

CDNs are intermediary servers that replicate read intensive data to provide better performance when user requests them. A close relative of CDNs is edge computing (e.g. gaming stations) where lots of computation is done directly close to the user. Types of CDNs # Mainly three…

June 3, 2025 · Reading Time: 3 minutes · By Xuanqiang Angelo Huang

Notions of Security

CIAA principles of security # We have already outlined these principles in Sicurezza delle reti and talked about the concepts of authentication and integrity. Here we try to deepen these concepts and delve a little bit more on the attack vectors. This note mainly focuses on the…

June 3, 2025 · Reading Time: 7 minutes · By Xuanqiang Angelo Huang

Optimizations for DNN

Mixture of Experts # There is a gate that opens a subset of the experts, and the output is the weighted sum of the outputs of the experts. The weights are computed by a gating network. One problem is load balancing, non uniform assignment. And there is a lot of communication…

June 3, 2025 · Reading Time: 11 minutes · By Xuanqiang Angelo Huang

Cluster Management Policies

We have resources, but need to know how to assign these to the jobs that need them. This note presents some of the most common resource management policies for cloud clusters. Introduction to cluster management # How can we allocate the resources in a cluster in an efficient…

June 2, 2025 · Reading Time: 8 minutes · By Xuanqiang Angelo Huang

Compute Express Link

This allows us to extend the memory hierarchy (see Memoria ) that we have today. The problem is that we have heterogeneous access patterns specifications and hardware. One of the main trends is disaggregation : we want to be able to scale different resources independently.…

June 2, 2025 · Reading Time: 3 minutes · By Xuanqiang Angelo Huang

Queueing Theory

Queueing theory is the theory behind what happens when you have lots of jobs, scarce resources, and subsequently long queues and delays. It is literally the “theory of queues”: what makes queues appear and how to make them go away. This is basically what happens in clusters,…

June 2, 2025 · Reading Time: 10 minutes · By Xuanqiang Angelo Huang

HTTP e REST

HTTP is the acronym for HyperText Transfer Protocol. Caratteristiche principali (3) # Comunicazioni fra client e server, e quanto sono comunicate le cose si chiude la connessione e ci sono politiche di caching molto bone (tipo con i proxy) Generico : perché è un protocollo…

December 6, 2024 · Reading Time: 6 minutes · By Xuanqiang Angelo Huang