12 everyday technologies powered by Linux
allthingsopen.org·10h
🐧Linux
Flag this post
‘Greatest vulnerability’: Australian Navy chief says protecting undersea cables is ‘existential’
breakingdefense.com·3h
🛡️Cybersecurity
Flag this post
Dive into Systems
⚡Systems Programming
Flag this post
SentinelOne integrates its acquisitions and protects AI with AI
techzine.eu·3h
🔒security
Flag this post
Retail cybersecurity statistics for 2025
heimdalsecurity.com·1d
🛡️Cybersecurity
Flag this post
Are you a freelancer? North Korean spies may be using you
cointelegraph.com·8h
🛡️Cybersecurity
Flag this post
YouTube ‘Ghost Network’ Spreads Infostealer via 3,000 Fake Videos
hackread.com·2d
🛡️Cybersecurity
Flag this post
E Tech Group Recognized with CSIA's First Certification for an Enterprise
prnewswire.com·2h
🔌Embedded Systems
Flag this post
These 5 obscure Docker containers help solve my biggest smart home problems
xda-developers.com·2h
🔌Embedded Systems
Flag this post
CORS and Same-Origin Policy Deep Dive
🛡️Cybersecurity
Flag this post
Nym and NymVPN - Next-gen privacy with mixnet and VPN service
discuss.privacyguides.net·2h
🔒security
Flag this post
Infrastructure Sovereignty and the AI-Proof Skill Stack: What the OpenAI-AWS Deal Reveals About Future-Proof Careers
⚡Systems Programming
Flag this post
Automated Anomaly Detection and Predictive Maintenance in Self-Propelled Brush Rollers Using Bayesian Network Fusion
🔌Embedded Systems
Flag this post
Show HN: Polyglot standard library HTTP client C/C++/Rust/Python and benchmarks
🔧Assembly Language
Flag this post
A First Look at the Adoption of BGP-based DDoS Scrubbing Services
labs.ripe.net·9h
🛡️Cybersecurity
Flag this post
Akamai Research: AI Bots Threaten the Foundation of Web-Based Business Models
prnewswire.com·1d
🛡️Cybersecurity
Flag this post
Predicting & Mitigating Data Corruption in Pure Storage Flash Arrays via Adaptive Bit Error Rate Modeling
🔌Embedded Systems
Flag this post
Loading...Loading more...