How to implement resource-based authorization (resource-based vs. role-based vs. attribute-based)
cerbos.devยท9hยท
Discuss: r/programming
๐Ÿ—„๏ธDatabase Theory
Flag this post
Why we chose OCaml to write Stategraph
stategraph.devยท10hยท
๐ŸคProtocol Design
Flag this post
A PoC to make a backdoored PyTorch neural network
hacktelligence.orgยท2dยท
Discuss: Hacker News
โš–๏ธLogic Programming
Flag this post
Slow Software for a Burning World
bonfirenetworks.orgยท9hยท
Discuss: Lobsters
๐ŸŒDistributed Systems
Flag this post
Journal retracts โ€˜bizarreโ€™ placebo effect paper
retractionwatch.comยท4h
โš™Functional Programming
Flag this post
OVHcloud: Quantum random number generation SSL certificates for all customers
blog.ovhcloud.comยท4dยท
Discuss: Hacker News
๐ŸคProtocol Design
Flag this post
Winning at the Edges
holenventures.comยท15hยท
Discuss: Hacker News
๐Ÿ“ˆComplexity Theory
Flag this post
Patterns for Building a Scalable Multi-Agent System
devblogs.microsoft.comยท1hยท
Discuss: Hacker News
โšกConcurrency
Flag this post
Geonum โ€“ geometric number library for unlimited dimensions with O(1) complexity
github.comยท4dยท
Discuss: Hacker News
๐Ÿง Memory Management
Flag this post
A Practical Guide to Managing Multiple Git Accounts with SSH
dev.toยท3hยท
Discuss: DEV
๐ŸงฉTheorem Proving
Flag this post
Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation
thehackernews.comยท11h
๐Ÿ”ŒNetwork Programming
Flag this post
Adaptive Hybrid PLC Channel Estimation via Recursive Bayesian Filtering
dev.toยท2hยท
Discuss: DEV
๐ŸŽฒProbabilistic Programming
Flag this post
SQL or NoSQL? A Real Story From Building Healthcare Software (and How FHIR Fits In)
dev.toยท1dยท
Discuss: DEV
๐Ÿ—„๏ธDatabase Theory
Flag this post
Puzzleet: When Algorithms Meet Play
vibe.forem.comยท47mยท
Discuss: DEV
๐ŸงฉTheorem Proving
Flag this post
Normalized tensor train decomposition
arxiv.orgยท18h
๐Ÿ”—Parser Combinators
Flag this post
Active Noise Control Method Using Time Domain Neural Networks for Path Decoupling
arxiv.orgยท1d
๐ŸŒDistributed Systems
Flag this post
SHIELD: Securing Healthcare IoT with Efficient Machine Learning Techniques for Anomaly Detection
arxiv.orgยท1d
๐ŸคProtocol Design
Flag this post
Can LLMs subtract numbers?
arxiv.orgยท2dยท
Discuss: Hacker News
โš–๏ธLogic Programming
Flag this post
Dual epitaxial telecom spin-photon interfaces with long-lived coherence
nature.comยท1d
๐ŸŒDistributed Systems
Flag this post