FastAPI & PostgreSQL Sharding: A Step-by-Step Guide (Part 1) - Theory
realpython.comยท1hยท
Discuss: DEV
๐Ÿ”—Hash Algorithms
Understanding RS256: A Deep Dive into Asymmetric Encryption
dev.toยท2dยท
Discuss: DEV
๐Ÿ”—Hash Algorithms
Indexing, Hashing, and Query
dev.toยท16hยท
Discuss: DEV
๐Ÿ”—Hash Algorithms
Fun with HyperLogLog and SIMD
vaktibabat.github.ioยท2dยท
๐Ÿ”ขBit Manipulation
OpenSSH 10.1/10.1p1 Released
openssh.comยท3hยท
Discuss: Hacker News
๐Ÿ’ปTerminal Control
Using Palm Jumeirah's Design to Visualize the Elliptic Curve Method
codingpirate.comยท11hยท
Discuss: Hacker News
๐Ÿ”ขAlgebraic Datatypes
I started using VeraCrypt to protect my files and I should have sooner
makeuseof.comยท22h
๐Ÿ›ก๏ธSecurity Type Systems
Building a HashMap in Rust - Part 1: What's a Hashmap?
cglab.caยท5d
๐Ÿ”—Hash Algorithms
Fundamentals metrics for Software Engineering derived from Math Statistics
dev.toยท16hยท
Discuss: DEV
๐Ÿ”ขAlgebraic Datatypes
Highly concurrent in-memory counter in GoLang
engineering.grab.comยท10h
๐Ÿง Memory Models
Plugin Secure
rya.ncยท2dยท
Discuss: Hacker News
๐Ÿ›ก๏ธParser Security
Cuckoo hashing improves SIMD hash tables
reiner.orgยท1dยท
๐Ÿ—๏ธHash Tables
The Making of Digital Identity โ€“ The Birth of Digital Authentication
syntheticauth.aiยท19hยท
Discuss: Hacker News
๐Ÿ›ก๏ธCapability Security
Using Information Entropy To Make Choices / Choose Experiments
blog.demofox.orgยท6h
โš–๏ธInference Rules
Federal Reserve Warns Quantum Computers Could Expose Bitcoinโ€™s Hidden Past
thequantuminsider.comยท44mยท
Discuss: r/privacy
๐ŸŽฏRing Buffers
The math Module in Python: 6 Common Calculations You Can Make
howtogeek.comยท18h
๐Ÿ“Mathematical Computing
INDEXING - HASHING - AND -QUERY
dev.toยท7hยท
Discuss: DEV
๐ŸŒธBloom Indexing
A content defined chunking algorithm testbed
github.comยท2dยท
Discuss: Hacker News
๐Ÿ”„Deduplication
The little Random that could
blog.julik.nlยท1d
๐Ÿ”ขBit Manipulation