Zero-Trust with Zero-Friction eBPF in Calico v3.31
tigera.io·22h
🐝Cilium
Flag this post
Why Alpha Arena was a bad benchmark
borisagain.substack.com·3h·
Discuss: Substack
🛡️AI Security
Flag this post
Why stop at 1 million tokens when you can have 10? My journey to extreme context on a gaming GPU. [P]
reddit.com·1d·
📱Edge AI
Flag this post
100 Techniques for Writing Readable Rust Code
github.com·15h·
Discuss: r/rust
🦀Rust Macros
Flag this post
Building Trinity Protocol v3.1: A Deep Dive into 2-of-3 Multi-Chain Consensus
dev.to·2d·
Discuss: DEV
🤝Paxos
Flag this post
What data do coding agents send, and where to?
chasersystems.com·1d·
Discuss: Hacker News
🔭Tracing
Flag this post
How AI is Revolutionizing Malware Detection in Modern Software Systems
dev.to·5h·
Discuss: DEV
🦠Malware Analysis
Flag this post
Quantum Machine Unlearning: Foundations, Mechanisms, and Taxonomy
arxiv.org·1d
⚛️Quantum Computing
Flag this post
Security Audit of intel ICE Driver for e810 Network Interface Card
arxiv.org·14h
🔍eBPF
Flag this post
flowengineR: A Modular and Extensible Framework for Fair and Reproducible Workflow Design in R
arxiv.org·1d
🔧Data Engineering
Flag this post
CHIP8 – writing emulator, assembler, example game and VHDL hardware impl
blog.dominikrudnik.pl·1d·
Discuss: Hacker News
🖥️Emulation
Flag this post
1 billion JSON records, 1-second query response: Apache Doris vs. ClickHouse, Elasticsearch, and PostgreSQL
dev.to·1d·
Discuss: DEV
🔥DataFusion
Flag this post
Hydra: Dual Exponentiated Memory for Multivariate Time Series Analysis
arxiv.org·1d
📈Time-Series Databases
Flag this post
Context Engineering with Real-Time, Processed Data
confluent.io·17h·
Discuss: Hacker News
📨Apache Kafka
Flag this post
Using Coding Agents to Decompile Nintendo 64 Games
blog.chrislewis.au·7h·
Discuss: Hacker News
🔓Binary Exploitation
Flag this post
KAPLAN — Stealthy Bulk Fetching Over Tor for Red Team Ops
dev.to·6h·
Discuss: DEV
🔗Linkerd
Flag this post
A Soft‑Fork Proposal for Blockchain‑Based Distributed AI Computation
hackernoon.com·2d
⛓️Blockchain
Flag this post
Two-Parameter R\'enyi Information Quantities with Applications to Privacy Amplification and Soft Covering
arxiv.org·14h
📊Information Theory
Flag this post
Math.random, friend or foe?
dev.to·1d·
Discuss: DEV
🔀Procedural Generation
Flag this post
Reflections on Trusting Trust (1984)
web.archive.org·3d·
Discuss: Hacker News
🏷️Memory Tagging
Flag this post