Adapting classical deception theory to cyber counterintelligence: challenges and opportunities
tandfonline.comΒ·1d
πŸ‡ΈπŸ‡ͺSwedish Cryptanalysis
Dell's AI Server Boom: Why The Rally Still Has Room To Run
seekingalpha.comΒ·5h
πŸ“°Feed Readers
Question nand flash memory
forums.anandtech.comΒ·1h
🧲Magnetic Recording
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.comΒ·4d
πŸ“ΊVT100
How I provide technical clarity to non-technical leaders
seangoedecke.comΒ·13h
βš™οΈProof Engineering
Vulnerability Management – Requirements, Scoping & Target Setting
blog.nviso.euΒ·3d
πŸ”Capability Systems
Millions of (very) private chats exposed by two AI companion apps
malwarebytes.comΒ·2d
πŸ”“Hacking
Idea to how to fix the fan speed problem on Dell r740 with idrac firmware past 7.0
dell.comΒ·13hΒ·
Discuss: r/homelab
πŸ”ŒOperating system internals
Implementing ZADD If Key Exists
rozumem.xyzΒ·2dΒ·
Discuss: Hacker News
⚑Redis Internals
Boosting Unit Test Automation at Audible with Amazon Q Developer
aws.amazon.comΒ·1d
πŸ”„Reproducible Builds
Moving Compute Intensive Lambdas from AWS to Vercel
moneyonfire.comΒ·15hΒ·
Discuss: Hacker News
πŸ”„Sync Engine
Ghosts in the Code: A Memorial Grove for Deleted AI
connectingminds.ukΒ·2dΒ·
Discuss: DEV, Hacker News
🏺Protocol Archaeology
The A.I. Prompt That Could End the World
nytimes.comΒ·2dΒ·
⚑Proof Automation
🧱 The SOLID Principles Explained (Like You’re a Developer Who Actually Writes Code)
dev.toΒ·1hΒ·
Discuss: DEV
🐚Shell Calculus
Built a β€œcode-first + visual” ETL/ELT Pipeline in Go β€” feedback wanted from data folks
reddit.comΒ·20hΒ·
Discuss: r/golang
πŸ’§Liquidhaskell
OBCache: Optimal Brain KV Cache Pruning for Efficient Long-Context LLM Inference
arxiv.orgΒ·2d
πŸ’»Local LLMs
Tech With Tim: Python Web Scraping: A Million Dollar Project Idea - FULL Build/Tutorial
dev.toΒ·1dΒ·
Discuss: DEV
πŸŒ€Brotli Internals
🌩️ Smart Cloud Computing: How AI and ML Are Transforming Cloud Cost Optimization
dev.toΒ·3hΒ·
Discuss: DEV
πŸ–₯️Self-hosted Infrastructure
How I found an unauthenticated goldmine of PII
infosecwriteups.comΒ·2d
πŸ”“Hacking
Randomized and quantum approximate matrix multiplication
arxiv.orgΒ·2d
πŸ”Quantum Cryptography