How Backblaze Computer Backup and Jamf Pro Extension Attributes Enhance the Customer Experience
backblaze.comยท1d
๐Ÿ’พPersistence Strategies
Nix pills
nixos.orgยท3d
โ„๏ธNixpkgs
Exposure Management Beyond The Endpoint
tenable.comยท9h
๐Ÿ’พPersistence Strategies
Welcome Rachel Frick to Our Board!
flickr.orgยท1d
๐Ÿ›Digital humanities
HTTP/3: The Next Evolution of Web Protocols
corero.comยท1d
๐ŸŒNetwork Protocols
Offensive OSINT s05e10 - Interactive investigative stories part 1
offensiveosint.ioยท7h
๐ŸŒWARC Forensics
โ€œCan you test my game?โ€ Fake itch.io pages spread hidden malware to gamers
malwarebytes.comยท16h
๐Ÿš€Indie Hacking
C++ Reflection and Qt MOC
wiki.qt.ioยท3hยท
Discuss: Hacker News
๐ŸงฉWASM Modules
Synology reverses course on non-certified HDDs in NAS systems
techspot.comยท6h
๐Ÿ Homelab Preservation
BYOC as a pillar of an everywhere platform (2024)
jack-vanlightly.comยท20hยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Why Netflix Joined the Certificate Wars (And Why It Matters)
hackernoon.comยท22h
๐Ÿ”PKI Archaeology
Detecting Notational Errors in Digital Music Scores
arxiv.orgยท2d
๐ŸŽผComputational Musicology
๐Ÿ’ป Mastering MongoDB CRUD Operations โ€” A Hands-on Student Database Example ๐ŸŽ“
dev.toยท11hยท
Discuss: DEV
๐ŸฆดDatabase Paleontology
WebSockets vs. HTTP: Stop Choosing the Wrong Protocol
medium.comยท3hยท
Discuss: Hacker News
๐ŸŒWebSocket Framing
Detecting Semantic Clones of Unseen Functionality
arxiv.orgยท1d
๐Ÿ”—Binary Similarity
JEPAs Unveiled: How Your AI Implicitly Knows Your Data's Secrets
dev.toยท18hยท
Discuss: DEV
๐Ÿ”Vector Forensics
Channel Simulation and Distributed Compression with Ensemble Rejection Sampling
arxiv.orgยท22h
โง—Information Bottleneck
ObCLIP: Oblivious CLoud-Device Hybrid Image Generation with Privacy Preservation
arxiv.orgยท1d
๐Ÿ”Homomorphic Encryption
SECA: Semantically Equivalent and Coherent Attacks for Eliciting LLM Hallucinations
arxiv.orgยท1d
๐Ÿ‘‘Coq Tactics