Handling Events Coming in an Unknown Order
architecture-weekly.com·2d
📬Message Queues
Flag this post
A Guide to My Organizational Workflow
⏰Time Management
Flag this post
On this day in 1988, the Morris worm infected 10% of the Internet within 24 hours — worm slithered out and sparked a new era in cybersecurity
💾Retro Computing
Flag this post
Data Observability in Analytics: Tools, Techniques, and Why It Matters
kdnuggets.com·1d
🔧Data Engineering
Flag this post
From Vibe Coding to Informed Development: How Codalio PRD Transforms Your Cursor Workflow
🎨API Design
Flag this post
AgentBnB: A Browser-Based Cybersecurity Tabletop Exercise with Large Language Model Support and Retrieval-Aligned Scaffolding
arxiv.org·2d
📖Interactive Fiction
Flag this post
Proactive DDoS Detection and Mitigation in Decentralized Software-Defined Networking via Port-Level Monitoring and Zero-Training Large Language Models
arxiv.org·2d
🌐Network Security
Flag this post
ECGXtract: Deep Learning-based ECG Feature Extraction for Automated CVD Diagnosis
arxiv.org·6h
🧠Machine Learning
Flag this post
How I Prepared for a Data Science Interview at a Large Tech Company
kdnuggets.com·18h
📊Data Science
Flag this post
Designing Data-Intensive Applications [Book Review]-The Big Ideas Behind Reliable, Scalable and Maintainable Systems
🏗️System Design
Flag this post
Designing My First Zoom System Design Interview Platform from the Trenches
🏗️System Design
Flag this post
CODECK: A PORTABLE LINUX BASED COMPUTER
🥧Raspberry Pi
Flag this post
IoMT Vulnerabilities Putting Patient Health Data at Risk
hackernoon.com·2d
🔒Security
Flag this post
From Postgres to Iceberg
🗄️Databases
Flag this post
Automated Spectral Artifact Correction via Multi-Modal Data Fusion and Bayesian Optimization in Cuvette Microscopy
🧠Machine Learning
Flag this post
Towards Automated Petrography
arxiv.org·2d
👁️Computer Vision
Flag this post
Loading...Loading more...