This week’s system design refresher:
-
Course of vs. Thread (Youtube video)
-
ChatGPT Timeline
-
DDoS Assault
-
Fallacies of distributed computing
What’s the distinction between Course of and Thread?
ChatGPT historical past
ChatGPT and replica. ai introduced consideration to AIGC (AI-generated Content material). Why is AIGC gaining explosive development?
The diagram beneath summarizes the event on this space.
OpenAI has been creating GPT (Generative Pre-Prepare) since 2018.
GPT 1 was skilled with BooksCorpus dataset (5GB), whose predominant focus is language understanding.
On Valentine’s Day 2019, GPT 2 was launched with the slogan “too harmful to launch”. It was skilled with Reddit articles with over 3 likes (40GB). The coaching price is $43k.
Later GPT 2 was used to generate music in MuseNet and JukeBox.
In June 2020, GPT 3 was launched, which was skilled by a way more complete dataset.
Extra functions have been developed based mostly on GPT 3, together with:
-
DALL-E: creating pictures from textual content
-
CLIP: connecting textual content and pictures
-
Whisper: multi-lingual voice to textual content
-
ChatGPT: chatbot, article author, code author
With the event of AIGC algorithms, many corporations have functions to generate textual content, pictures, code, voice, and video.
I strongly suggest that you just play with these functions. The outcomes are astonishing!
👉 Over to you: Have you ever chatted with ChatGPT? What did you ask it?
What’s a DDoS (Distributed Denial-of-Service) Assault?
Why is it hazardous to the companies? Right here is an instance of how DDoS works.
The aim of a DDoS assault is to disrupt the conventional site visitors of the sufferer servers by way of malicious requests. Consequently, the servers are swamped with malicious requests and don’t have any buffer to deal with regular requests.
-
Steps 1 and a pair of: An attacker remotely controls a community of zombies by way of the controller. These zombies are then instructed remotely by the attacker.
-
Step 3: The zombies can ship requests to the sufferer servers, exhausting the servers’ assets. Since zombies are respectable web gadgets, it’s tough to differentiate DDoS site visitors from regular site visitors.
An instance of a standard DDoS assault is an SYN flood.
Usually the shopper and server set up a TCP connection by way of a 3-way handshake. On account of an SYN flood assault, zombies ship many SYN requests to the server, however they by no means return an ACK from the server.
This ends in an exhaustion of assets on the sufferer server because of the accumulation of many half-open TCP connections.
👉 Over to you: Have you ever encountered a DDoS assault in manufacturing? How did you clear up it?
Fallacies of distributed computing
About 30 years in the past, Peter Deutsch drafted a listing of eight fallacies in distributed computing environments, now referred to as “The 8 fallacies of distributed computing”. A few years later, the fallacies stay.
Featured job openings
HEIR: Senior Software program Engineer, Full Stack (United States)