From Raw to Refined: Data Pipeline Architecture at Scale
dev.to·9h·
Discuss: DEV
⚙️Batch Processing
Flag this post
CVE-2025-50165: Critical Flaw in Windows Graphics Component
zscaler.com·11h·
Discuss: Hacker News
💣ZIP Vulnerabilities
Flag this post
OctoPDF: Free, Accurate, and Reliable PDF/A Validation for Everyone
pdfa.org·2d
📄PDF Archaeology
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.org·1d
🎭Cultural Informatics
Flag this post
It's LIT! Reliability-Optimized LLMs with Inspectable Tools
arxiv.org·3d
🌀Brotli Internals
Flag this post
Meet the SWHID: The end of broken links, broken builds
softwareheritage.org·2d
🏺Format Archaeology
Flag this post
Weekly Update 479
troyhunt.com·1h
🔒Privacy Archives
Flag this post
Markdown Is Holding You Back
newsletter.bphogan.com·9h·
Discuss: Hacker News
📋Document Grammar
Flag this post
rpki-client seeks €300K in funding by 2026 to sustain development
discoverbsd.com·2d
🔌Operating system internals
Flag this post
Taming the Beast: The Move To Declarative API Validation in Kubernetes - Yongrui Lin, Google
youtube.com·1d
Format Validation
Flag this post
A report from our 2025 conference on ‘Records at Risk’
britishrecordsassociation.org.uk·3d
📋records management
Flag this post
Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk
darknet.org.uk·2d
📦Package Managers
Flag this post
Python Certifi and Custom CAs
zufallsheld.de·13h·
Discuss: Hacker News
🧪CBOR Fuzzing
Flag this post
Percona Brings Transparent Data Encryption to Postgres
thenewstack.io·1d
🗄️PostgreSQL WAL
Flag this post
7-Zip: Attackers Inject Malicious Code
heise.de·2d
💣ZIP Vulnerabilities
Flag this post
Show HN: RAG-chunk – A tool to choose optimal chunk sizes for RAG
medium.com·1d·
Discuss: Hacker News
📄Text Chunking
Flag this post
Challenges compiling old C++ code on modern Linux
smalldatum.blogspot.com·13h·
🔗Static Linking
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.com·1d
🎯NTLM Attacks
Flag this post
This Week in Security: Cloudflare Wasn’t DNS, BADAUDIO, and Not a Vuln
hackaday.com·1d
🔓Hacking
Flag this post
The Easiest Way to Build a Type Checker
jimmyhmiller.com·11h·
Discuss: Hacker News
Bidirectional Typing
Flag this post