Lazy Backup (2006)
aaronsw.com·1d·
Discuss: Hacker News
📮Message Queues
Flag this post
PgEdge and CloudNativePG Partnership: Simplifying Distributed Postgres on K8s
pgedge.com·15h·
Discuss: Hacker News
🧩Microservices
Flag this post
The race to shore up Europe’s power grids against cyberattacks and sabotage
theregister.com·2d·
Discuss: Hacker News
🌐Distributed systems
Flag this post
US Traces Ransomware Attacks to 2 People Working for Cybersecurity Firms
pcmag.com·1d·
Discuss: Hacker News
💹Rust Finance
Flag this post
Think for Yourself
kevlinhenney.medium.com·1d·
Discuss: Hacker News
💻Programming languages
Flag this post
Going From Reactive to Predictive Incident Response with AIOps
hackernoon.com·1d
📊Systems Monitoring
Flag this post
Lights on Humans: An Experiment
humansinsystems.com·15h·
Discuss: Hacker News
📨Apache Kafka
Flag this post
The Paradox of a Principled Machine
artificiallyintelligentspace.substack.com·1d·
Discuss: Substack
🌐Distributed systems
Flag this post
Petri Dish Neural Cellular Automata
pub.sakana.ai·1d·
Discuss: Hacker News
🌐Distributed systems
Flag this post
Building Real-Time ML Feature Pipelines with Streaming SQL
timeplus.com·13h·
Discuss: Hacker News
📈Time Series ML
Flag this post
The Complexity Cliff: Why Reasoning Models Work Right Up Until They Don't
rewire.it·7h·
Discuss: Hacker News
📈Time Series ML
Flag this post
Tiny GenBI: Lightweight Agent for business analysis
github.com·8h·
Discuss: Hacker News
🔥DataFusion
Flag this post
SUSE Enterprise Linux 16 is here, and its killer feature is digital sovereignty
zdnet.com·1d·
Discuss: Hacker News
🌐Distributed systems
Flag this post
Sick Systems – How to Keep Someone with You Forever (2010)
issendai.com·2d·
Discuss: Hacker News
🌐Distributed systems
Flag this post
Reforging the ReScript Build System
rescript-lang.org·1d·
🦀Rust
Flag this post
Theft at the Louvre, the password was the museum's name
decripto.org·19h·
Discuss: Hacker News
📊Systems Monitoring
Flag this post
What data do coding agents send, and where to?
chasersystems.com·1d·
Discuss: Hacker News
📦Data Serialization
Flag this post
A Guide to My Organizational Workflow
cachestocaches.com·6h·
Discuss: Hacker News
🌐Distributed systems
Flag this post
Cyber experts warn of the 'catastrophic' threat quantum computing could pose
9news.com.au·1d·
Discuss: Hacker News
🌐Distributed systems
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.org·2d·
Discuss: Hacker News
📮Message Queues
Flag this post