How to store passwords in your database
systemdesignbutsimple.com·4d·
Discuss: r/programming
#️⃣Hash Tables
Flag this post
Bring Confidence to Complex Data Migrations with Snapshot Testing
spin.atomicobject.com·1d·
Discuss: Hacker News
🧪Testing
Flag this post
Moving V8 to only flat strings
docs.google.com·1d·
Discuss: Hacker News
📄FlatBuffers
Flag this post
Making .NET Serialization Gadgets by Hand
vulncheck.com·2d·
Discuss: Hacker News
📦Binary Formats
Flag this post
Show HN: Lynq – Turn Database Rows into Kubernetes Infrastructure Automatically
lynq.sh·1d·
Discuss: Hacker News
☸️Kubernetes
Flag this post
Spore
news.ycombinator.com·16h·
Discuss: Hacker News
🤖Cyberpunk
Flag this post
A catalog of side effects
bernsteinbear.com·4d·
🦀Rust Macros
Flag this post
Robotics has its GPT2 Moment
theahura.substack.com·1d·
Discuss: Substack
💬Prompt Engineering
Flag this post
I built a cloud computer that just feels like a computer
fulghum.io·1d·
Discuss: Hacker News
🚀Shuttle
Flag this post
Building a Mini Kafka in Go — My Journey Creating go-pub-sub
dev.to·4d·
Discuss: DEV
🐼Redpanda
Flag this post
Efficient Thought Space Exploration through Strategic Intervention
arxiv.org·21h
💬Prompt Engineering
Flag this post
FedeCouple: Fine-Grained Balancing of Global-Generalization and Local-Adaptability in Federated Learning
arxiv.org·21h
📱Edge AI
Flag this post
BIPPO: Budget-Aware Independent PPO for Energy-Efficient Federated Learning Services
arxiv.org·2d
📱Edge AI
Flag this post
Trigger AWS CodePipeline from a Cross-Account S3 Upload (Using EventBridge + IAM Roles)
dev.to·7h·
Discuss: DEV
☁️Cloudflare Workers
Flag this post
SWAP: Towards Copyright Auditing of Soft Prompts via Sequential Watermarking
arxiv.org·4d
🔢Homomorphic Encryption
Flag this post
Show HN: Privacy Experiment – Rewriting HTTPS, TLS, and TCP/IP Packet Headers
news.ycombinator.com·4d·
Discuss: Hacker News
🔍eBPF
Flag this post
Inside the App Store: Insights from 10,000 Google Play Applications
dev.to·1d·
Discuss: DEV
📊Data Science
Flag this post
Building a Social Network Analyzer with CXXGraph: From Friend Recommendations to Influence Detection
dev.to·2d·
Discuss: DEV
🕸️Graph Databases
Flag this post
Mixture-of-Experts explained with PyTorch implementation
lightcapai.medium.com·1d·
Discuss: Hacker News
🔥PyTorch
Flag this post
iSeal: Encrypted Fingerprinting for Reliable LLM Ownership Verification
arxiv.org·1d
🛡️AI Security
Flag this post