Identifying Tool Thieves with a DIY Toolroom Management System
hackster.io·15h
⚡Assembly
Flag this post
Students in China: solve a math problem for the Wi-Fi password!
mindyourdecisions.com·1d
⚙Low-Level
Flag this post
The New 2025 OWASP Top 10 List: What Changed, and What You Need to Know
fastly.com·1d
⚙Systems Programming
Flag this post
Supercharging Real-Time Applications with TiDB and DragonflyDB
pingcap.com·3d
🗄️Databases
Flag this post
How context engineering can save your company from AI vibe code overload: lessons from Qodo and Monday.com
⚙Systems Programming
Flag this post
SQLC Dynamic Filters and Bulk Inserts
🗄️Databases
Flag this post
Beginner’s Guide to Conquering NanoCorp on HackTheBox
thecybersecguru.com·1d
🔨From Scratch
Flag this post
Accelerated Degradation Modeling of Automotive Semiconductor Memory via Bayesian Gaussian Process Regression
🧠Memory Management
Flag this post
TileMapLayer - is this really the way?
🎮Game Engines
Flag this post
Dual-Pathway Fusion of EHRs and Knowledge Graphs for Predicting Unseen Drug-Drug Interactions
arxiv.org·7h
🗄️Databases
Flag this post
Associative Poisoning to Generative Machine Learning
arxiv.org·1d
🗄️Databases
Flag this post
From DataWareHouses to BigData Systems: What and Why - Questions that nobody asks, but you should!
🗄️Databases
Flag this post
Monads in Haskell
🔨From Scratch
Flag this post
How to Choose a Dependency: Build vs Buy, Risk Management, and More
hackernoon.com·3d
🔨From Scratch
Flag this post
Loading...Loading more...