How the Math That Powers Google Foresaw the New Pope
scientificamerican.comยท15h
โš–๏ธFeed Ranking
Announcing the 2025 NDSA Excellence Award Winners
ndsa.orgยท1d
๐Ÿ›๏ธPREMIS Metadata
How to Tame Varnish Memory Usage Safely
fastly.comยท3d
๐ŸŽฏPerformance Forensics
Detecting DLL hijacking with machine learning: real-world cases
securelist.comยท5d
๐ŸŽซKerberos Exploitation
Millions of (very) private chats exposed by two AI companion apps
malwarebytes.comยท1d
๐Ÿ”“Hacking
Implementing ZADD If Key Exists
rozumem.xyzยท1dยท
Discuss: Hacker News
โšกRedis Internals
โ€˜Dozensโ€™ of organizations had data stolen in Oracle-linked hacks
techcrunch.comยท2d
๐Ÿ”“Hacking
Cranemail: $75 Lifetime email host, 250gb storage, unlimited domains and aliases
namecrane.comยท10hยท
Discuss: Hacker News
๐Ÿ Homelab Preservation
Moving Compute Intensive Lambdas from AWS to Vercel
moneyonfire.comยท4hยท
Discuss: Hacker News
๐Ÿ”„Sync Engine
How Do SSDs Work?
extremetech.comยท1dยท
Discuss: Hacker News
๐ŸงฒMagnetic Recording
Zippers: Making Functional "Updates" Efficient (2010)
goodmath.orgยท2dยท
๐ŸŒณIncremental Parsing
Reverse Engineering keyboard firmware with Ghidra
blog.usedbytes.comยท3dยท
Discuss: Hacker News
๐Ÿ”“Reverse engineering
Immersive Historical Reconstruction Validation via Multi-Sensor VR Data Fusion & Causal Inference
dev.toยท4hยท
Discuss: DEV
๐ŸบComputational Archaeology
Bayesian Optimization for Dynamic Sample Size Allocation in A/B Testing
dev.toยท7hยท
Discuss: DEV
๐ŸงฎKolmogorov Bounds
TCDRM: A Tenant Budget-Aware Data Replication Framework for Multi-Cloud Computing
arxiv.orgยท1d
๐Ÿ’พStorage Replication
AI-Driven Ethical Risk Assessment & Mitigation in Supply Chain Compliance
dev.toยท23hยท
Discuss: DEV
๐Ÿ”—Supply Chain
Iomega Storcenter ix4 Nas Failed: 3 drives remain good, one is toast. How to rebuild raid and recover data
reddit.comยท8hยท
Discuss: r/homelab
๐Ÿ› ๏ธGreaseweazle
Managing Asynchronous Work with Celery and Redis
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠApache Kafka
Hyper-Personalized Cyberbullying Mitigation via Adaptive Linguistic Fingerprinting and Behavioral Anomaly Detection
dev.toยท17hยท
Discuss: DEV
๐ŸŽ›๏ธFeed Filtering
RecGen: a powerful tool to create recommendation systems
dev.toยท1dยท
Discuss: DEV
๐Ÿ”—Constraint Handling