Exhaustive profiling toolkit: elfutils and libdwfl_stacktrace
developers.redhat.comยท2d
๐Profiling Tools
Flag this post
Moving V8 to only flat strings
๐FlatBuffers
Flag this post
Needy Programs
๐ฅ๏ธSerenityOS
Flag this post
Building a Secure DAL: Composable Multi-Tenancy Filtering with C# and Linq2Db
๐งMaterialize
Flag this post
Scaling HNSWs
๐ฆCuckoo Hashing
Flag this post
Building an Automated SAST + DAST Pipeline: Solving One of the Biggest Security Problems in Modernโฆ
blog.devops.devยท6h
๐Quickwit
Flag this post
I Let Attackers Train My AI-powered Security Proxy (Hereโs What Happened)
๐ก๏ธAI Security
Flag this post
PHP: Do you need async?
๐Concurrency
Flag this post
MongoDB Drivers and Network Compression
๐
WiredTiger
Flag this post
Causal Model-Based Reinforcement Learning for Sample-Efficient IoT Channel Access
arxiv.orgยท12h
๐Information Theory
Flag this post
NestJS Week 2: Exception Filters, Query Params, and Why You Should Stop Using Try-Catch Everywhere
๐ก๏ธError Handling
Flag this post
Generalized Security-Preserving Refinement for Concurrent Systems
arxiv.orgยท3d
๐Lock-Free Programming
Flag this post
Working on my first operator project
๐งDevOps
Flag this post
How I Built a Google Maps Scraper to Generate Leads for My New Agency (And Why I Open-Sourced It)
๐ฑProgressive Web Apps
Flag this post
Supervised fine-tuning as a method for training-based AI control
lesswrong.comยท18h
๐ก๏ธAI Security
Flag this post
Loading...Loading more...