A QOJ week
blog.mitrichev.chยท10hยท
๐ŸŒณFenwick Trees
Flag this post
Constraints on the availability of high magnitude flows for managed aquifer recharge
iopscience.iop.orgยท1d
๐Ÿ”ฒCellular Automata
Flag this post
Building and running Request Tracker as a quadlet container
developers.redhat.comยท23h
๐Ÿ”ŒgRPC
Flag this post
GarageHQ Setup Getting Slower After 10+ Million Objects
reddit.comยท5hยท
Discuss: r/selfhosted
๐Ÿ“File Systems
Flag this post
Kubernetes Isnโ€™t Your AI Bottleneck โ€” Itโ€™s Your Secret Weapon
thenewstack.ioยท1d
๐Ÿ”งDevOps
Flag this post
Cisco's new IQ platform is like ChatGPT for network ops, and it's coming for your dashboard
techspot.comยท14h
๐Ÿ™๏ธSmart Cities
Flag this post
"Nobody really wants a data center in their backyard," says Microsoft attorney
datacenterdynamics.comยท11h
๐Ÿ Self-Hosting
Flag this post
Modbus Slave Library
github.comยท9hยท
Discuss: r/embedded
๐ŸŽ›๏ธMicrocontrollers
Flag this post
An overview of the PPPP protocol for IoT cameras
palant.infoยท15hยท
Discuss: Hacker News
โšกQUIC Protocol
Flag this post
I built a self-healing home lab with n8n
xda-developers.comยท1d
๐Ÿ Home Automation
Flag this post
The Power Problem โ€“ A Silicon Valley Story
syntheticauth.aiยท7hยท
Discuss: Hacker News
๐Ÿ”Capability Systems
Flag this post
The Role of Observability in Modern Backends with .NET and AWS
dev.toยท3dยท
Discuss: DEV
๐Ÿ‘๏ธObservability
Flag this post
How We Integrate Legacy Systems With Modern Stacks
dev.toยท2dยท
Discuss: DEV
๐Ÿ’ฐTigerBeetle
Flag this post
Automated REST API Anomaly Detection via Graph Neural Network-Driven Causal Inference
dev.toยท12hยท
Discuss: DEV
๐Ÿ“ฑEdge AI
Flag this post
Fix: externalizing network I/O in serverless computing
arxiv.orgยท2dยท
Discuss: Hacker News
โ˜๏ธCloudflare Workers
Flag this post
Labs for Broke โ€“ EKS for Pennies
georgedeblog.comยท2dยท
Discuss: Hacker News
๐Ÿ Self-hosting
Flag this post
Understanding the Impact of Edge Computing on Real-Time Applications
dev.toยท1dยท
Discuss: DEV
๐ŸŒEdge Computing
Flag this post
Part 1: Understanding the 5 Levels of Operational Maturity in Telecom
dev.toยท1dยท
Discuss: DEV
๐ŸŒEdge Computing
Flag this post
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.comยท17h
๐Ÿ”’Security
Flag this post