kxkrx's Top FindsLoading...
SailPoint's Second Act
strategyofsecurity.com·19h·
Discuss: Hacker News
🔄Legacy Migration
Flag this post
Have They Found a Complete UNIX V4?
hackaday.com·1d
©️C Programming
Flag this post
Sign up or login to customize your feed and get personalized topic recommendations
Network edge design checklist: Part 2 — Network edge design
blog.apnic.net·11h
🔄Legacy Migration
Flag this post
The “Dependency Cutout” Workflow Pattern, Part I
blog.glyph.im·16h·
🔄Legacy Migration
Flag this post
This breached credentials dump has millions of actively used passwords
howtogeek.com·1d
🔒CyberSecurity
Flag this post
Agentic AI Is Reframing the Enterprise Buy-vs-Build Calculus
pymnts.com·8h
🔄Legacy Migration
Flag this post
BigQuery under the hood: How Google brought embeddings to analytics
cloud.google.com·47m
Flag this post
Finally, a Windows terminal that’s fast, colorful, and easy to use
makeuseof.com·47m
Flag this post
European Governments Turn to Matrix for Secure Sovereign Messaging Amid US Big Tech Concerns
blogger.com·3h
Flag this post
I built a CLI tool to stop copy-pasting the same prompts to LLMs
reddit.com·9h·
Discuss: r/commandline
Flag this post
From Frustration to Protection: The Logic of Secure Coding
dev.to·1d·
Discuss: DEV
🔒CyberSecurity
Flag this post
💻Your GitHub Speaks Louder Than Your Resume: A Tiger Cloud Story🐅
dev.to·1d·
Discuss: DEV
📋JCL
Flag this post
E2E-VGuard: Adversarial Prevention for Production LLM-based End-To-End Speech Synthesis
arxiv.org·12h
🔒CyberSecurity
Flag this post
HBM Leads The Way To Defect-Free Bumps
semiengineering.com·9h
Flag this post
6 proven lessons from the AI projects that broke before they scaled
venturebeat.com·2d
🔄Legacy Migration
Flag this post
EGG-SR: Embedding Symbolic Equivalence into Symbolic Regression via Equality Graph
arxiv.org·12h
Flag this post
Designing the Yahoo System Design Interview Platform Under Pressure
dev.to·13h·
Discuss: DEV
🔄Legacy Migration
Flag this post
Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity
dev.to·1d·
Discuss: DEV
📋JCL
Flag this post
From Auth to Action: The Complete Guide to Secure & Scalable AI Agent Infrastructure (2026)
dev.to·1d·
Discuss: DEV
🔄Legacy Migration
Flag this post
Designing Blockchain #1: Introduction
dev.to·4h·
Discuss: DEV
Flag this post