Distributed Systems, Consistency, Availability, Partition Tolerance

Odd-Cycle-Packing-treewidth: On the Maximum Independent Set problem in odd-minor-free graph classes
arxiv.org·9h
🌳Fenwick Trees
Flag this post
Bring Your Own Blob Storage?
nuon.co·18h·
Discuss: Hacker News
📁File Systems
Flag this post
I built a cloud computer that just feels like a computer
fulghum.io·1d·
Discuss: Hacker News
🚀Shuttle
Flag this post
Project-oak: Meaningful control of data in distributed systems
github.com·20h·
Discuss: Hacker News
🔒Tetragon
Flag this post
Human or Machine? Low-Latency Audio Detection of Humans at Scale
nooks.ai·17h·
Discuss: Hacker News
🚀Performance
Flag this post
Ossa: Towards the Next Generation Web
jamesparker.me·3d·
Discuss: Hacker News
🤝Paxos
Flag this post
HPE Reveals Compute And Networking for GX5000 Supercomputers
nextplatform.com·20h·
RDMA
Flag this post
A Magical Studies Research Report on Paxos
dev.to·2d·
Discuss: DEV
🤝Paxos
Flag this post
Show HN: ByteSync – Open-source hybrid file sync (LAN and remote, E2EE)
news.ycombinator.com·36m·
Discuss: Hacker News
🔍eBPF
Flag this post
Investigating CoT Monitorability in Large Reasoning Models
arxiv.org·2d
🦙Ollama
Flag this post
Bcachefs Rolls Out Metadata Version Reconcile "rebalance_v2" Feature
phoronix.com·20h
💿SPDK
Flag this post
Rust Concurrency for Go Developers: Achieving Full Compile-Time Safety
dev.to·1d·
Discuss: DEV
🔀Crossbeam
Flag this post
Debating Modern Postgres Architectures: Shared Nothing vs. Shared Everything
news.ycombinator.com·1d·
Discuss: Hacker News
💽NVMe
Flag this post
The "Vibe-Coding" Epidemic
app.codalio.com·23h·
Discuss: DEV
🎭Program Synthesis
Flag this post
10× Faster Log Processing at Scale: Beating Logstash Bottlenecks with Timeplus
timeplus.com·1d·
Discuss: Hacker News
🔎Quickwit
Flag this post
Linux process priorities demystified
sigma-star.at·1d·
Discuss: Lobsters
📅Linux Scheduling
Flag this post
Biometric Key Derivation for Decentralized Identity Using Fuzzy Extractors
blog.shodipoayomide.com·18h·
Discuss: Hacker News
🔢Homomorphic Encryption
Flag this post
The Law of Leaky Abstractions
joelonsoftware.com·3d·
Discuss: Hacker News
📏Linear Types
Flag this post
Understanding Serverless Computing in Cloud Application Development
dev.to·5h·
Discuss: DEV
☁️Cloud Computing
Flag this post
AI Failure Examples That Showed Us How to Build an AI Agent
netguru.com·1d·
Discuss: Hacker News
🦙Ollama
Flag this post