⚠️ Do not use LLMs to privatize your data without Differential Privacy! ⚠️
reddit.com·5h·
Discuss: r/LocalLLaMA
🔢Homomorphic Encryption
Flag this post
From Pandas to Upstream Control: The Evolution PyData Needs Next
dev.to·1d·
Discuss: DEV
🗄️Database Sharding
Flag this post
Two security issues discovered in sudo-rs, a Rust-based implemention of sudo
lists.debian.org·1d·
🦀Rust
Flag this post
Indexing, Hashing & Query Optimization in SQL
dev.to·2d·
Discuss: DEV
🔍Query Optimization
Flag this post
.NET: Avoid Using Guid.CreateVersion7
gist.github.com·1d·
Discuss: Hacker News
📦Binary Formats
Flag this post
IBM Patented Euler's 200 year old Math Technique
leetarxiv.substack.com·1h·
🌀Naiad
Flag this post
12 Scanners to Find Security Vulnerabilities and Misconfigurations in Kubernetes
reddit.com·1d·
Discuss: r/kubernetes
🚀Shuttle
Flag this post
Kruskal's Tree Theorem
en.wikipedia.org·2d·
Discuss: Hacker News
🌳Fenwick Trees
Flag this post
Fire in the Hole! Benchmarking is broken
medium.com·3h·
Discuss: r/LocalLLaMA
🚀Performance
Flag this post
The folly that was Tandem Computers and the path that led me to NonStop
itug-connection.blogspot.com·7h·
Discuss: Hacker News
💰TigerBeetle
Flag this post
Scaling HNSWs
simonwillison.net·1d
💾Cache Design
Flag this post
Explorations of RDMA in LLM Systems
le.qun.ch·2d·
Discuss: Hacker News
RDMA
Flag this post
AI Failure Examples That Showed Us How to Build an AI Agent
netguru.com·4h·
Discuss: Hacker News
🦙Ollama
Flag this post
Mastering Cryptography: A Senior's Guide to Design, Attack, and Defend
dev.to·1d·
Discuss: DEV
🔐Cryptography
Flag this post
Space-Efficient and Output-Sensitive Algorithms for the Longest Common Bitonic Subsequence
arxiv.org·12h
🎯Van Emde Boas Trees
Flag this post
How Does Digital Trust Actually Work? A Deep Dive into the Science of Secrecy
dev.to·22h·
Discuss: DEV
🔐Cryptography
Flag this post
Hybrid Hash Join – breaking the memory wall of streams join
timeplus.com·1d·
Discuss: Hacker News
💰TigerBeetle
Flag this post
Introduction: Truthmaker Semantics: What, What For, and How?
link.springer.com·1d·
Discuss: Hacker News
💫Effect Systems
Flag this post
Educational Byte: How to Find and Install a Fully Decentralized Node on Obyte
hackernoon.com·2d
🔢Homomorphic Encryption
Flag this post
Dangers in Your Gemfile
fastruby.io·5h·
Discuss: Hacker News
🏷️Memory Tagging
Flag this post