Hans-Juergen Schoenig: Counting Customers in PostgreSQL
cybertec-postgresql.comยท22h
๐Ÿ’‰SQL Injection
Flag this post
Benchmarking the cost of Java's EnumSet - A Second Look
kinnen.deยท8hยท
Discuss: r/programming
๐Ÿ”ฌReverse Engineering
Flag this post
Calculating the spreading of fluids in porous materials to understand saltwater in soil
phys.orgยท11h
๐ŸPython
Flag this post
Ground zero: 5 things to do after discovering a cyberattack
welivesecurity.comยท1d
๐ŸฆˆWireshark
Flag this post
Phone companies to block scam calls from abroad that impersonate banks under new Government plans
dailymail.co.ukยท4h
๐Ÿ›ฃ๏ธBGP
Flag this post
Rodrigo Girรฃo Serrรฃo: A generator, duck typing, and a branchless conditional walk into a bar
mathspp.comยท7h
๐ŸPython
Flag this post
Health privacy bill seeks protections for data collected by apps, smartwatches
discuss.privacyguides.netยท8h
๐ŸฆˆWireshark
Flag this post
Diving Deeper into Blockchain and Web3 Product Engineering โ€“ Week 1 Learnings
farcaster.xyzยท2dยท
Discuss: DEV
๐Ÿ›ฃ๏ธBGP
Flag this post
H-FA: A Hybrid Floating-Point and Logarithmic Approach to Hardware Accelerated FlashAttention
arxiv.orgยท23h
๐ŸPython
Flag this post
DOGE Prints Lower-Low Sequence as $0.17 Resistance Locks In
coindesk.comยท10h
๐Ÿ”Cybersecurity
Flag this post
Why millions of connected vehicles need automated cyber security
techradar.comยท13h
๐Ÿ”Cybersecurity
Flag this post
Disciplined Biconvex Programming
arxiv.orgยท23h
๐Ÿ’ปComputer Science
Flag this post
Making Services Discoverable with ERC-8004: Trustless Agent Registration with Filecoin Pin
dev.toยท6hยท
Discuss: DEV
๐Ÿ”’TLS/SSL
Flag this post
Pg_lake: Postgres with Iceberg and data lake access
github.comยท11hยท
๐ŸณDocker
Flag this post
AI Browsers Spark Debate Over Privacy and Cybersecurity Risks
blogger.comยท14h
๐ŸŽฏPenetration Testing
Flag this post
Towards Automated Petrography
arxiv.orgยท23h
๐ŸPython
Flag this post
Informatics-Driven Selection of Polymers for Fuel-Cell Applications
arxiv.orgยท1d
๐ŸPython
Flag this post