How We Designed the Khadas Mind
khadas.com·4h
🔐Hardware Security
Flag this post
Beyond CASB: SaaS Security in the Era of Shadow IT and AI Integrations
guidepointsecurity.com·1h
🔐Capability Systems
Flag this post
How to check if a .onion is alive or dead (with Hidden Service Descriptors)
discuss.privacyguides.net·17h
🔍eBPF
Flag this post
<![CDATA[ Announcing DoltLab on Podman ]]>
dolthub.com·1d
🐳Docker
Flag this post
CVE-2025-31133, CVE-2025-52565, CVE-2025-52881 - runc container issues
aws.amazon.com·17h
🐝Cilium
Flag this post
Sable and Able: A Tale of Two ASIs
lesswrong.com·1d
🔲Cellular Automata
Flag this post
A fresh look at the Spring Framework
infoworld.com·1d
🎨API Design
Flag this post
SAP Expands Its AI Stack for Developers
thenewstack.io·15h
💬Prompt Engineering
Flag this post
Integrity Under Siege: A Rogue gNodeB's Manipulation of 5G Network Slice Allocation
arxiv.org·6h
📦Protocol Buffers
Flag this post
Battle Scars from the Cloud Front
☁️Cloud Computing
Flag this post
Agentic DevOps: I Let GitHub Copilot Run My Entire CI/CD Pipeline (And Lived to Tell the Tale)
🏗️Cranelift
Flag this post
Loading...Loading more...