Inside a 34-Petabyte Migration: The True Cost of Moving a Digital Mountain
hackernoon.com·3d
📁File Systems
Flag this post
Understanding Hashing: The Backbone of Data Integrity in Cybersecurity
dev.to·1d·
Discuss: DEV
🔗Hash Functions
Flag this post
Feature Infrastructure Engineering: A Comprehensive Guide
mlfrontiers.substack.com·3h·
Discuss: Substack
📡Protocol Buffers
Flag this post
How Distributed ACID Transactions Work in TiDB
pingcap.com·1d
📮Message Queues
Flag this post
Show HN: DedupX – Duplicate file finder with perceptual image matching for macOS
maheepk.net·2d·
Discuss: Hacker News
🏷️Memory Tagging
Flag this post
Oops, My UUIDs Collided
alexsci.com·1d·
Discuss: Hacker News
🔗Hash Functions
Flag this post
Understanding Primary Keys in Relational Databases: A Key to Data Integrity and Fast Lookups
dev.to·1d·
Discuss: DEV
🗄️Database Engines
Flag this post
Minimal Sufficiency: A Principle ‘Similar’ to End-to-End
cacm.acm.org·1d·
Discuss: Hacker News
📡Protocol Stacks
Flag this post
Big Data, Small Genes: Handling Terabytes of DNA Information
medium.com·25m·
Discuss: DEV
📋JSON Parsing
Flag this post
Using the expand and contract pattern for schema changes
prisma.io·23h·
Discuss: Hacker News
🔄Copy Propagation
Flag this post
System Design Explained Like a Human — 25 Core Concepts with Real Examples and Tools Part -1
dev.to·12h·
Discuss: DEV
📮Persistent Queues
Flag this post
I built an encrypted self-hosted file sync tool for my home, and it's so much better than a cloud service
xda-developers.com·2d
📁File Systems
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·1d
🔗Hash Functions
Flag this post
Proving Authenticated Key Exchange via Memory-Efficient Reductions
eprint.iacr.org·3d
📡Binary Protocols
Flag this post
Reactive Tree Management in Nuxt 4: How I Modeled Complex Hierarchies with Pinia
dev.to·7h·
Discuss: DEV
🗄️Database Engines
Flag this post
Update; GUI in C
github.com·1d·
📝Rope Editors
Flag this post
Is creating such a setup possible and the smart thing to do in my situation?
reddit.com·20h·
Discuss: r/selfhosted
🔄Bootstrapping
Flag this post
OP_RETURN Attack Surface Demo
opreturns.github.io·5h
🛡️Security Type Systems
Flag this post
The Structure of Data
theprogrammersparadox.blogspot.com·1d·
🪢Rope Data Structures
Flag this post
De Bruijn Numerals
text.marvinborner.de·2d·
Discuss: Hacker News
λLambda Calculus
Flag this post