“When I worked at LookingGlass, Paolo was the lead engineer who established the product’s foundation and contributed a lot of vision to the product and its direction. When Paolo and I spoke at length, he always expressed a solid understanding of all facets of computer science as well as technology’s impact on people.”
About
I began exploring computers in 1984 and at 16, I released my first professional software…
Services
Contributions
Activity
-
Our December 2024 edition of ‘Overload’ magazine, version 184, is now available to read for free! Includes pieces by Lucian Radu Teodorescu, Seb…
Our December 2024 edition of ‘Overload’ magazine, version 184, is now available to read for free! Includes pieces by Lucian Radu Teodorescu, Seb…
Liked by Paolo Fabio Zaino
-
Please do better, Cloudflare. It is suspicious to give admin permission by default to streamline the onboarding of SOME new users. I'd say it raises…
Please do better, Cloudflare. It is suspicious to give admin permission by default to streamline the onboarding of SOME new users. I'd say it raises…
Liked by Paolo Fabio Zaino
-
What can be better than coroutines? The Sender model, which is even proposed for C++ standardization P2300R10 https://lnkd.in/ewQcsfsS. The core…
What can be better than coroutines? The Sender model, which is even proposed for C++ standardization P2300R10 https://lnkd.in/ewQcsfsS. The core…
Liked by Paolo Fabio Zaino
Experience
-
Freelance
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Education
Licenses & Certifications
Patents
-
Systems and methods for low latency stateful threat detection and mitigation
Issued US 11,201,887
A method of securing a network, the method comprising: obtaining, by a detection engine of at least one hardware processor, an encapsulated image defining an action for a predetermined data packet of interest, wherein the encapsulated image is an encapsulated snapshot of a stack machine operation including one or more of associated registers, stacks, heap, or code; determining, by the detection engine, that the action defined by the encapsulated image should be applied to one or more data…
A method of securing a network, the method comprising: obtaining, by a detection engine of at least one hardware processor, an encapsulated image defining an action for a predetermined data packet of interest, wherein the encapsulated image is an encapsulated snapshot of a stack machine operation including one or more of associated registers, stacks, heap, or code; determining, by the detection engine, that the action defined by the encapsulated image should be applied to one or more data packets accessed by the detection engine; as a result of determining that the action defined by the encapsulated image should be applied to the accessed data packet, generating and deploying, by the detection engine, an action state including one or more attributes associated with the accessed data packet and the encapsulated image; determining, at a first execution engine of the at least one hardware processor, the first execution engine executing in parallel with the detection engine, that the one or more data packets comprises attributes matching the one or more attributes included in the deployed action state; executing, by the first execution engine, the action included in the deployed action state on a received data packet to generate a processed data packet; determining, by the first execution engine, that the first execution engine is not capable of executing the action included in the deployed action state; terminating, by the first execution engine, the action; and updating, by the first execution engine, the deployed action state based on the terminated action and the received data packet, wherein the updated action state includes a contextual state of the received data packet.
Other inventorsSee patent -
Systems and methods for dynamic zone protection of networks
Issued US 11,057,415
One of the challenges associated with providing threat protection across an organization is providing threat protection that scales across the organization (e.g., across multiple networks, multiple users, multiple sites, multiple zones, as will be described in further detail below) at data line rates once a threat is detected at a single point within the organization environment. The embodiments disclosed herein are directed to specialized software architecture and design that provide a…
One of the challenges associated with providing threat protection across an organization is providing threat protection that scales across the organization (e.g., across multiple networks, multiple users, multiple sites, multiple zones, as will be described in further detail below) at data line rates once a threat is detected at a single point within the organization environment. The embodiments disclosed herein are directed to specialized software architecture and design that provide a combination of the high throughput detection and sophisticated processing required to handle deeper correlation/analysis of cyber threats across a large-scale organization environment. In the context of the current disclosure, an organization environment may include any networked environment associated with a business, enterprise, and/or organization.
In the context of the current disclosure, dynamic zone protection refers to a method and system for securing a network using one or more controllers, one or more network nodes, and/or one or more agent nodes in accordance to the embodiments disclosed herein. In some embodiments, dynamic zone protection may include the following components as will be described in further detail below: a packet processing engine configured to process incoming network packets, a processing analysis engine configured to perform relatively more complex processing and analysis, endpoint threat detection and mitigation that may be performed utilizing the packet processing engine and the processing analysis engine, and one or more controllers configured to coordinate one or more packet processing engines and one or more processing analysis engines across a network. That is, the aforementioned components may be utilized to provide security for various network-connected devices within a network as part of a dynamic zone protection scheme. For example, the overall tasks associated with threat detection and mitigation may be distributed amongst and across the c...Other inventorsSee patent
Projects
-
zLNN - Liquid Artificial Neural Network in Rust
A flexible Liquid Neural Network foundational library in Rust for High Performance and modern AI. Supports multiple back-ends like:
- OpenCL (for AMD GPUs, FPGA integration and Cloud Computing)
- Apple Metal (for Apple Silicon)
- NVidia CUDA (for Linux, Windows and Cloud Computing)
zLNN is released under dual license: AGPL and Commercial…A flexible Liquid Neural Network foundational library in Rust for High Performance and modern AI. Supports multiple back-ends like:
- OpenCL (for AMD GPUs, FPGA integration and Cloud Computing)
- Apple Metal (for Apple Silicon)
- NVidia CUDA (for Linux, Windows and Cloud Computing)
zLNN is released under dual license: AGPL and Commercial License.
https://paolozaino.wordpress.com/portfolio/zlnn-zed-liquid-neural-network-accelerated-lnn-in-rust-for-performance-safety-and-improved-precision/ -
UltimaVM - High performant bytecode Interpreter
Ultima is a portable and efficient bytecode interpreter virtual machine (VM) designed for Application Virtualization and to improve security and software engineers’ development experience, as well as optimize bytecode execution.
The project not only is the VM written in highly optimized ANSI C99, but also a dynamic and generic compiler written in C++11 which can ingest compilation rules to represent semantics, grammar and code generation and so can be used to implement compilers for…Ultima is a portable and efficient bytecode interpreter virtual machine (VM) designed for Application Virtualization and to improve security and software engineers’ development experience, as well as optimize bytecode execution.
The project not only is the VM written in highly optimized ANSI C99, but also a dynamic and generic compiler written in C++11 which can ingest compilation rules to represent semantics, grammar and code generation and so can be used to implement compilers for multiple programming languages to UltimaVM bytecode.
Ultima can also be used for in-kernel dynamic content execution for AV and EVR solutions.
https://paolozaino.wordpress.com/portfolio/ultima-vm-unified-lightweight-typed-instructions-machine/ -
The CROWler - Web content discovery development platform
An Open Source Content Discovery and Development Platform. Empowering Cybersecurity, AI, Marketing, and Finance professionals and researchers to discover, analyze, and interact with the web in all its dimensions.
https://github.com/pzaino/thecrowler -
CloudShield PacketLinux - High performance networking OS
-
PacketLinux is a complete Linux based distribution for Intel x86 64bits system developed and optimized to boost Network Services and Deep Packet Inspection software applications performances. It implements all the most advanced technologies to reduce latency and boost network performances on x86 parallel architectures with the lowest possible impact on software applications development. PacketLinux makes it possible to boost every network application performances without having to re-think the…
PacketLinux is a complete Linux based distribution for Intel x86 64bits system developed and optimized to boost Network Services and Deep Packet Inspection software applications performances. It implements all the most advanced technologies to reduce latency and boost network performances on x86 parallel architectures with the lowest possible impact on software applications development. PacketLinux makes it possible to boost every network application performances without having to re-think the application and in most cases also without recompiling the application itself reducing so porting costs and time.
Other creatorsSee project -
DNS Enforcer
-
DNS Enforcer was a complete DNS Server Protection solution. It allowed DNS traffic rate limiting based on the analysis of which source IP/subnet was generating more suspicious requests. The entire solution architecture was modular and allowed system administrators to highly customize software behaviour, making it possible to build DNS protection solutions completely performant to each single requirement.
-
Open NetVM
-
A 32bit, platform independent, really small and light weight Virtual Machine Engine capable of executing Assembler code in a distribute environment made by array of PCs running Linux or Windows OS. This virtual machine made it easier to develop parallel applications compared to PVM library as it was a full virtual machine and executing assembler code so it was possible to write almost all sort of programming language compiler for it.
-
Virtual Sites Server
-
A complete Application/Portal Framework for Microsoft ASP and IIS. VSS peculiar characteristic was to be able to automatically build Access Portals and back-end business applications all integrated on the same Server in order to provide access to reports through the Portal with full integration between reports and CMS while offering a feature rich business application platform where it was possible to develop all sort of business solution in short time. VSS has been used to develop many…
A complete Application/Portal Framework for Microsoft ASP and IIS. VSS peculiar characteristic was to be able to automatically build Access Portals and back-end business applications all integrated on the same Server in order to provide access to reports through the Portal with full integration between reports and CMS while offering a feature rich business application platform where it was possible to develop all sort of business solution in short time. VSS has been used to develop many business applications used in public and private sector that spanned from vehicles management to Call Centers back-end business applications, Internet portals and more.
Other creatorsSee project -
NetSec FW
A firewall solution based on OpenBSD
Languages
-
English
Native or bilingual proficiency
-
Italian
Native or bilingual proficiency
-
French
Elementary proficiency
Recommendations received
-
LinkedIn User
3 people have recommended Paolo Fabio
Join now to viewMore activity by Paolo Fabio
-
We have a new ZAP Scan Policies add-on https://lnkd.in/eSfb_S-N This defines a set of active scan policies ideal for different scenarios. We would…
We have a new ZAP Scan Policies add-on https://lnkd.in/eSfb_S-N This defines a set of active scan policies ideal for different scenarios. We would…
Liked by Paolo Fabio Zaino
-
𝗣𝗼𝘁𝗲𝗻𝘁𝗶𝗮𝗹 𝗽𝗮𝗿𝗮𝗱𝗶𝗴𝗺 𝘀𝗵𝗶𝗳𝘁 𝗶𝗻 𝗟𝗟𝗠𝘀: 𝗻𝗲𝘄 𝗽𝗮𝗽𝗲𝗿 𝗯𝘆 𝗠𝗲𝘁𝗮 𝗰𝗹𝗮𝗶𝗺𝘀 𝘁𝗵𝗮𝘁 𝘄𝗲 𝗰𝗮𝗻 𝗴𝗲𝘁 𝗿𝗶𝗱 𝗼𝗳…
𝗣𝗼𝘁𝗲𝗻𝘁𝗶𝗮𝗹 𝗽𝗮𝗿𝗮𝗱𝗶𝗴𝗺 𝘀𝗵𝗶𝗳𝘁 𝗶𝗻 𝗟𝗟𝗠𝘀: 𝗻𝗲𝘄 𝗽𝗮𝗽𝗲𝗿 𝗯𝘆 𝗠𝗲𝘁𝗮 𝗰𝗹𝗮𝗶𝗺𝘀 𝘁𝗵𝗮𝘁 𝘄𝗲 𝗰𝗮𝗻 𝗴𝗲𝘁 𝗿𝗶𝗱 𝗼𝗳…
Liked by Paolo Fabio Zaino
-
This is a hard lesson to learn: Not the speaking slower part—the thinking long term about people part. Especially if your personality is to go…
This is a hard lesson to learn: Not the speaking slower part—the thinking long term about people part. Especially if your personality is to go…
Liked by Paolo Fabio Zaino
-
Today Liquid AI has announced they have rised 250M Series A led by AMD to fund and train their models on AMD. This is a fantastic news, not only for…
Today Liquid AI has announced they have rised 250M Series A led by AMD to fund and train their models on AMD. This is a fantastic news, not only for…
Shared by Paolo Fabio Zaino
-
Nicely done IBM !!!! This is another really interesting development that improves GenAI performance and may lead to reduce power consumption, hence…
Nicely done IBM !!!! This is another really interesting development that improves GenAI performance and may lead to reduce power consumption, hence…
Shared by Paolo Fabio Zaino
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More