5 ways to strengthen your firewall and endpoint’s defenses against ransomware
news.sophos.com·1h
🌐Network Security
Flag this post
Time for a Reboot How We Measure Customer Success
cmswire.com·1d
💰TigerBeetle
Flag this post
How Buildertrend Drives Innovation with Memorystore for Valkey
cloud.google.com·3h
📋Columnar Storage
Flag this post
Improved swarm model with informed agents to prevent stealth attackers based on a vigilance mechanism
sciencedirect.com·1d
🎯Quorum Systems
Flag this post
Unified system intelligence: Learning energy strategies for optimizing operations, maintenance, and market outcomes
sciencedirect.com·1h
💬Prompt Engineering
Flag this post
New comment by Sumanto in "Ask HN: Who wants to be hired? (November 2025)"
📨Apache Kafka
Flag this post
Cloud Performance Beyond the Cloud: Monitoring the Entire Internet Stack
⚖️Load Balancing
Flag this post
Building a Resilient API Key Pool System with Health Checks and Multi-Tier Degradation
📱Progressive Web Apps
Flag this post
Designing Data-Intensive Applications [Book Review]-The Big Ideas Behind Reliable, Scalable and Maintainable Systems
🏗️System Design
Flag this post
Feature Stores 2.0: The Next Frontier of Scalable Data Engineering for AI
hackernoon.com·15h
🎨Design Systems
Flag this post
Introduction to Kubernetes (K8s)
☸️Kubernetes
Flag this post
The Geographic Imperative: How CockroachDB Turns Maps into Architecture
hackernoon.com·2d
📋Columnar Storage
Flag this post
From logs to insights: The AI breakthrough redefining observability
venturebeat.com·15h
🔭Tracing
Flag this post
Loading...Loading more...