Show HN: Steadykey โ€“ Deterministic Idempotency Keys with Pluggable Stores
npmjs.comยท1dยท
Discuss: Hacker News
๐Ÿ self hosting
Flag this post
Exploiting Cloud-Based Computing Solutions for Business Agility
tessfkfc680563.webbuzzfeed.comยท1d
๐Ÿ self hosting
Flag this post
Incogni vs. Aura: What's your best option for maintaining online privacy?
techradar.comยท8h
๐Ÿ self hosting
Flag this post
Bacula For Dummies
blog.feld.meยท5d
๐Ÿ self hosting
Flag this post
Mission-Critical in the Context of the API Manifesto and Move Fast/Break Things
aptiv.comยท1hยท
Discuss: Hacker News
๐Ÿ self hosting
Flag this post
America's Historic 40-Day Shutdown and Its Ripple Effects on Singapore - Maxthon
blog.maxthon.comยท21h
๐Ÿ”“opende source
Flag this post
The New 2025 OWASP Top 10 List: What Changed, and What You Need to Know
fastly.comยท1d
๐Ÿ self hosting
Flag this post
NAS IS NOT A BACK SOLUTION! Is this statement true?
reddit.comยท20hยท
Discuss: r/computers
๐Ÿ self hosting
Flag this post
Eliminate unnecessary costs in your Amazon S3 buckets with Datadog Storage Management
datadoghq.comยท1d
๐Ÿ‡ชEuropean data sovereignty
Flag this post
Optimizing your homelab containers: what cgroups v2 does differently
thecybersecguru.comยท19hยท
Discuss: r/homelab
๐Ÿ self hosting
Flag this post
LLM side-channel attack could allow snoops to guess what you're talking about
theregister.comยท1h
๐Ÿ‡ชEuropean data sovereignty
Flag this post
How Everyday Infrastructure Relies on Hidden Technologies Like Connectors
iotbusinessnews.comยท7h
๐Ÿ self hosting
Flag this post
Building Scalable, Fault-Tolerant, and Highly Available Cloud Architectures with AWS Best Practices.
dev.toยท1hยท
Discuss: DEV
๐Ÿ self hosting
Flag this post
Canโ€™t autosave? A cloud might be in the way
sixcolors.comยท9h
๐Ÿ self hosting
Flag this post
New Attacks Against Secure Enclaves
schneier.comยท13hยท
Discuss: Hacker News
๐Ÿ”“opende source
Flag this post
Updated Home Server setup
reddit.comยท9hยท
Discuss: r/homelab
๐Ÿ self hosting
Flag this post
Donโ€™t Be a Louvre: How Weak Passwords and Unpatched Software Encourage Breaches
blog.elcomsoft.comยท12h
๐Ÿ”“opende source
Flag this post
Time to start de-Appling
heatherburns.techยท12hยท
Discuss: Hacker News
๐Ÿ‡ชEuropean data sovereignty
Flag this post
Service metrics and its meanings
dev.toยท2hยท
Discuss: DEV
๐Ÿ‡ชEuropean data sovereignty
Flag this post
11 AWS Security Best Practices You Must Implement Now
dev.toยท3hยท
Discuss: DEV
๐Ÿ self hosting
Flag this post