Getting a Google Docs draft ready for Mailchimp via Emacs and Org Mode
sachachua.comยท16h
๐Ÿฆ‹Format Metamorphosis
To Measure is To Know: Breaking Down Datacenter Power Consumption
sigarch.orgยท13h
๐Ÿ“ŠHomelab Monitoring
Optimizing ZFS for High-Throughput Storage Workloads
klarasystems.comยท13h
๐Ÿ’ฟZFS Internals
Retrieval-Augmented Generation with Bob Remeika from Ragie [audio]
snyk.ioยท15hยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Solving a Wooden Puzzle Using Haskell
glocq.github.ioยท1dยท
๐Ÿ’ŽInformation Crystallography
A Software Engineer's Guide to Observability: Part 1 โ€“ Logging
engineering.theblueground.comยท17hยท
Discuss: Hacker News
๐Ÿ“Log Parsing
Google Releases VaultGemma, Its First Privacy-Preserving LLM
yro.slashdot.orgยท1d
๐Ÿ›ก๏ธDifferential Privacy
WebSocket Turbo Intruder: Unearthing the WebSocket Goldmine
portswigger.netยท18h
๐ŸงชProtocol Fuzzing
Securing Node.js development environment with AppArmor
dmitrychekanov.comยท13hยท
Discuss: Hacker News
๐Ÿ›ก๏ธCLI Security
Guaranteed AI: Verifiable Machine Learning in a Decentralized World
dev.toยท2dยท
Discuss: DEV
๐ŸคSecure Multiparty
How to secure MCP servers with Vault + ToolHive in Kubernetes
dev.toยท12hยท
Discuss: DEV
๐Ÿ“ฆContainer Security
Beyond the Build: Navigating Modern Software Development
dev.toยท1dยท
Discuss: DEV
๐Ÿ”„Language Evolution
AI Asset Management for Manufacturing (AIM4M): Development of a Process Model for Operationalization
arxiv.orgยท2d
๐Ÿ”Capability Systems
๐Ÿ“šEnterprise Design Patterns: Table Module with Python Example
dev.toยท23hยท
Discuss: DEV
๐ŸงฉSQLite Extensions
Blockchain-Enabled Federated Learning for Secure & Privacy-Preserving Genomic Data Sharing
dev.toยท5dยท
Discuss: DEV
๐Ÿ”’Privacy Preserving
Emerging Yurei Ransomware Claims First Victims
darkreading.comยท1d
๐ŸŽซKerberos Attacks
Building Web Servers from First Principles (Part 7)
dev.toยท7hยท
Discuss: DEV
โšกgRPC
CRUDAdmin โ€“ Modern admin interface for FastAPI
github.comยท17hยท
Discuss: Hacker News
๐Ÿ”ŒArchive APIs
Differential Privacy in Federated Learning: Mitigating Inference Attacks with Randomized Response
arxiv.orgยท2h
๐Ÿ”’Privacy Preserving