Distributed Computing, DataFrames, Big Data Processing, Analytics

New Major ReARM Release Includes Vulnerability Analysis Functionality
rearmhq.com·1d·
Discuss: Hacker News
🔧Database Internals
Flag this post
Amazon imposing fees on using their marketplace API
developer.amazonservices.com·2d·
Discuss: Hacker News
🔄ETL Pipelines
Flag this post
Universe's expansion 'is now slowing, not speeding up': Evidence mounts that dark energy weakens over time
phys.org·4h·
Discuss: Hacker News
📚Data Catalogs
Flag this post
Perplexity AI accuses Amazon of bullying with Comet legal threat
cnbc.com·10h·
Discuss: Hacker News
ClickHouse
Flag this post
When Your Hash Becomes a String: Hunting Ruby's Million-to-One Memory Bug
mensfeld.pl·1d·
Discuss: Hacker News
🔧Database Internals
Flag this post
Bloom filters are good for search that does not scale
notpeerreviewed.com·2d·
Query Optimization
Flag this post
A behind-the-scenes look at Broadcom’s design labs
techbrew.com·2d·
ClickHouse
Flag this post
4 Rules for Successful Vibe Coding
appsoftware.com·13h·
Discuss: Hacker News
🔍Data Lineage
Flag this post
Ask HN: How do you debug or trace Cloudflare RayIDs efficiently?
news.ycombinator.com·1d·
Discuss: Hacker News
🔄ETL Pipelines
Flag this post
Java's Agentic Framework Boom Is a Code Smell
gnanaguru.com·4d·
Discuss: Hacker News
🔄ETL Pipelines
Flag this post
Why Engineers Can't Be Rational About Programming Languages
spf13.com·2d·
🔄ETL Pipelines
Flag this post
AI-generated malware poses little real-world threat, contrary to hype
arstechnica.com·5h
🔒Database Security
Flag this post
Windows on Gigabyte MZ33-AR1 (AMD Turin) with Coreboot – ACPI and Bug Fixes
blog.3mdeb.com·18h·
Discuss: Hacker News
OLTP Systems
Flag this post
Lessons from 70 interviews on deploying AI Agents in production
mmc.vc·1d·
Discuss: Hacker News
ClickHouse
Flag this post
Reflections on Trusting Trust (1984)
web.archive.org·3d·
Discuss: Hacker News
OLTP Systems
Flag this post
The Demo-Driven Development Framework
supaamp.com·1d·
Discuss: Hacker News
ClickHouse
Flag this post
Do I want Coders to Code?
yeikoff.xyz·2d·
Discuss: Hacker News
🔄ETL Pipelines
Flag this post
GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
cloud.google.com·14h·
Discuss: Hacker News
🔍Data Lineage
Flag this post
Ghosts in the Codex Machine
docs.google.com·2d·
Discuss: Hacker News
🔄ETL Pipelines
Flag this post
Per-request isolation in TinyKVM explained
fwsgonzo.medium.com·5d·
Discuss: Hacker News
OLTP Systems
Flag this post