CCC Test of Time award
cstheory-events.org·22h
👨lectures
Flag this post
SOA-C03 AWS Certified CloudOps Engineer - Associate Exam Study Tips and Resources
certquestionsbank.com·14h·
👨lectures
Flag this post
What is BSD? Come to a conference to find out!
bsdly.blogspot.com·1d·
💻operating systems
Flag this post
Your Network, Your Rules: Why DDoS Protection Finally Works on Your Terms
corero.com·2d
💻operating systems
Flag this post
How a Mind Emerges From Mindless Things
psychologytoday.com·1d
👨lectures
Flag this post
🏗️ Mastering Infrastructure as Code: From Manual Chaos to Multi-Cloud Orchestration [Week-7—P1] ⚡
linkedin.com·18h·
Discuss: DEV
⚙️Compilers
Flag this post
Google Summer of Code 2025 Reports: Using bubblewrap to add sandboxing to NetBSD
blog.netbsd.org·1h
💻operating systems
Flag this post
Book review: “Build a DeepSeek Model (From Scratch)”
dev.to·7h·
Discuss: DEV
⚙️Compilers
Flag this post
Security Audit of intel ICE Driver for e810 Network Interface Card
arxiv.org·3d
💻operating systems
Flag this post
How to turn Defender & Sentinel alerts into actionable threat intelligence
vmray.com·1d
💻operating systems
Flag this post
The Cat's Out of the Bag: A 'Meow Attack' Data Corruption Campaign Simulation via MAD-CAT
trustwave.com·1d
👨lectures
Flag this post
Dive into Systems
diveintosystems.org·4d·
Discuss: Hacker News
👨lectures
Flag this post
A Deep Dive into Multi-Transport Protocol Abstraction in Python
dev.to·4d·
Discuss: DEV
💻operating systems
Flag this post
Network Topology|Physical and Logical Topology and types in detail| Israh Binoj
dev.to·2d·
Discuss: DEV
💻operating systems
Flag this post
Need some help/direction setting up my new homelab
reddit.com·3h·
Discuss: r/homelab
💻operating systems
Flag this post
Introduction to MLOps | Complete End-to-End Guide
youtu.be·5h·
Discuss: DEV
⚙️Compilers
Flag this post
🎲 Container Escapes 101 - Kernel resource sharing
some-natalie.dev·1d
💻operating systems
Flag this post
Patterns for Building a Scalable Multi-Agent System
devblogs.microsoft.com·18h·
Discuss: Hacker News
💻operating systems
Flag this post
Exploiting Data Structures for Bypassing and Crashing Anti-Malware Solutions via Telemetry Complexity Attacks
arxiv.org·1d
⚙️Compilers
Flag this post