Show HN: Mathematical parameter selection to eliminate synchronization bugs
news.ycombinator.com·8h·
Discuss: Hacker News
🕐Vector Clocks
Flag this post
The Transformer and the Hash
lesswrong.com·2d
🌳Merkle Trees
Flag this post
Availability — Queue Based Load Leveling
dev.to·14h·
Discuss: DEV
Ring Buffers
Flag this post
Distributed blockchain auth mechanism for secure and efficient MANETs
nature.com·2d·
Discuss: Hacker News
⛓️Blockchain
Flag this post
EP189: How to Design Good APIs
blog.bytebytego.com·18h
🎨API Design
Flag this post
Built a simple C program that cracks hashed passwords (dictionary attack). Looking for feedback!
reddit.com·1d·
🔓Binary Exploitation
Flag this post
Automated Digital Provenance Verification using Blockchain-Integrated Semantic Analysis
dev.to·1d·
Discuss: DEV
🔍Digital Forensics
Flag this post
Automated Container Orchestration Optimization via Dynamic Reinforcement Learning in Dynamic Microservice Environments
dev.to·4h·
Discuss: DEV
☸️Kubernetes
Flag this post
Node.js Security Checklist
blog.risingstack.com·9h·
Discuss: Hacker News
🔒Security
Flag this post
I tested GPT-5.1 Codex against Sonnet 4.5, and it's about time Anthropic bros take pricing seriously.
composio.dev·14h·
Discuss: r/ClaudeAI
📦Folly
Flag this post
Biometric Key Derivation for Decentralized Identity Using Fuzzy Extractors
blog.shodipoayomide.com·2d·
Discuss: Hacker News
🔢Homomorphic Encryption
Flag this post
Jordium.Snowflake.NET — A Fast and Lightweight Distributed ID Generator for .NET
dev.to·4h·
Discuss: DEV
➡️Apache Arrow
Flag this post
Enable Modern Data Flows with CDC Streaming
pub.towardsai.net·20h
🔀CRDTs
Flag this post
Convergence vs. Consensus in Distributed Systems
gowthamk.github.io·1d·
Discuss: Hacker News
🔄CRDT
Flag this post
Low Latency Optimization: Understanding Huge Pages (Part 1)
hudsonrivertrading.com·4h·
Discuss: Hacker News
💭Virtual Memory
Flag this post
Show HN: 1Pwned
github.com·13h·
Discuss: Hacker News
🔓Binary Exploitation
Flag this post
Conquering Complexity: Parallel Proof Search for Superhuman AI by Arvind Sundararajan
dev.to·6h·
Discuss: DEV
🎭Program Synthesis
Flag this post
Building a Distributed Database in Elixir (Part 1: Motivation and Challenges)
medium.com·5d·
Discuss: Hacker News
🔄Distributed Systems
Flag this post
When Reverse Proxies Surprise You: Hard Lessons from Operating at Scale
infoq.com·2d·
Discuss: Hacker News
☁️Cloudflare Workers
Flag this post
Making the Most of Your Docker Hardened Images Trial – Part 1
docker.com·1d
🐳Docker
Flag this post