Inside a 34-Petabyte Migration: The True Cost of Moving a Digital Mountain
hackernoon.com·3d
📁File Systems
Flag this post
How Distributed ACID Transactions Work in TiDB
pingcap.com·1d
📮Message Queues
Flag this post
Show HN: DedupX – Duplicate file finder with perceptual image matching for macOS
🏷️Memory Tagging
Flag this post
Oops, My UUIDs Collided
🔗Hash Functions
Flag this post
Understanding Primary Keys in Relational Databases: A Key to Data Integrity and Fast Lookups
🗄️Database Engines
Flag this post
System Design Explained Like a Human — 25 Core Concepts with Real Examples and Tools Part -1
📮Persistent Queues
Flag this post
I built an encrypted self-hosted file sync tool for my home, and it's so much better than a cloud service
xda-developers.com·2d
📁File Systems
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·1d
🔗Hash Functions
Flag this post
Proving Authenticated Key Exchange via Memory-Efficient Reductions
eprint.iacr.org·3d
📡Binary Protocols
Flag this post
Reactive Tree Management in Nuxt 4: How I Modeled Complex Hierarchies with Pinia
🗄️Database Engines
Flag this post
Update; GUI in C
📝Rope Editors
Flag this post
Is creating such a setup possible and the smart thing to do in my situation?
🔄Bootstrapping
Flag this post
OP_RETURN Attack Surface Demo
opreturns.github.io·5h
🛡️Security Type Systems
Flag this post
The Structure of Data
🪢Rope Data Structures
Flag this post
De Bruijn Numerals
λLambda Calculus
Flag this post
Loading...Loading more...