Dangers in Your Gemfile
fastruby.io·10h·
Discuss: Hacker News
🏷️Memory Tagging
Flag this post
HPE Reveals Compute And Networking for GX5000 Supercomputers
nextplatform.com·4h·
RDMA
Flag this post
Confidentiality in a Card-Based Protocol Under Repeated Biased Shuffles
arxiv.org·3d
#️⃣Hash Tables
Flag this post
Reverse Engineering the M1C1 LiDAR: cracking the protocol without documentation
dev.to·8h·
Discuss: DEV
🐛Fuzzing
Flag this post
Exploring the World of Distributed Protocols – A Self-Taught Journey
dev.to·1d·
Discuss: DEV
📹WebRTC
Flag this post
Building Supreme Dog Garage: Challenges, C++ Solutions, and Future Goals for a Premium Dog Gear Platform
dev.to·15h·
Discuss: DEV
🎨Design Systems
Flag this post
Consistent Hashing: The Unseen Engine
dev.to·6d·
Discuss: DEV
⚖️Consistent Hashing
Flag this post
I Will Use a Database (Not PostgreSQL) for My Data Needs
eloqdata.com·3d·
🗄️Databases
Flag this post
One Weird Hashing Trick
notes.hella.cheap·1d·
🧮Vector Databases
Flag this post
Building a Secure DAL: Composable Multi-Tenancy Filtering with C# and Linq2Db
byteaether.github.io·8h·
Discuss: DEV
💧Materialize
Flag this post
XML Schema Validation 1.1 in Java
dev.to·13h·
Discuss: DEV
📋Protobuf Schema
Flag this post
Analyzing a NPM Spam Campaign: The Great Indonesian Tea Theft
endorlabs.com·2h·
Discuss: Hacker News
🔎Quickwit
Flag this post
The Law of Leaky Abstractions
joelonsoftware.com·2d·
Discuss: Hacker News
📏Linear Types
Flag this post
the last couple years in v8's garbage collector
wingolog.org·7h·
Discuss: Hacker News
🗑️Garbage Collection
Flag this post
Listen to Database Changes Through the Postgres WAL
peterullrich.com·2d·
Discuss: Hacker News
ClickHouse
Flag this post
GPT-5.1 Prompting Guide
cookbook.openai.com·2h·
Discuss: Hacker News
💬Prompt Engineering
Flag this post
MongoDB Drivers and Network Compression
dev.to·6h·
Discuss: DEV
🐅WiredTiger
Flag this post
Welcome to DataHaskell
datahaskell.org·1d·
Discuss: Hacker News
🐧Rust for Linux
Flag this post