Inside a 34-Petabyte Migration: The True Cost of Moving a Digital Mountain
hackernoon.comยท2d
๐File Systems
Flag this post
Understanding Hashing: The Backbone of Data Integrity in Cybersecurity
๐Hash Functions
Flag this post
How Distributed ACID Transactions Work in TiDB
pingcap.comยท4h
๐ฎMessage Queues
Flag this post
Show HN: DedupX โ Duplicate file finder with perceptual image matching for macOS
๐ท๏ธMemory Tagging
Flag this post
Oops, My UUIDs Collided
๐Hash Functions
Flag this post
Understanding Primary Keys in Relational Databases: A Key to Data Integrity and Fast Lookups
๐๏ธDatabase Engines
Flag this post
I built an encrypted self-hosted file sync tool for my home, and it's so much better than a cloud service
xda-developers.comยท1d
๐File Systems
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท13h
๐Hash Functions
Flag this post
The Structure of Data
๐ชขRope Data Structures
Flag this post
Update; GUI in C
๐Rope Editors
Flag this post
๐ In praise of RSS and controlled feeds of information
yellowduck.beยท2d
๐ indieweb
Flag this post
De Bruijn Numerals
ฮปLambda Calculus
Flag this post
Performance Evaluation of Multimedia Traffic in Cloud Storage Services over Wi-Fi and LTE Networks
arxiv.orgยท1d
๐ฎPersistent Queues
Flag this post
Educational Benchmark: 100 Million Records with Mobile Logic Compression (Python + SQLite + Zlib)
๐ฆCompression Algorithms
Flag this post
Registry Analysis
๐ก๏ธTaint Analysis
Flag this post
Loading...Loading more...