Journey of a Curation Request: What Happens When You Ask for an Update to ROR
ror.org·2d
📋PREMIS Events
When AI Remembers Too Much – Persistent Behaviors in Agents’ Memory
unit42.paloaltonetworks.com·1d
🔲Cellular Automata
Proposal: Deconfig – Distributed Git Infrastructure with Durable Objects
github.com·22h·
Discuss: Hacker News
📦Git LFS
A disenshittification moment from the land of mass storage
doctorow.medium.com·10h
🧲Magnetic Philosophy
MultiPar 1.3.3.5 Beta / 1.3.2.9
scour.ing·14h
🏺ZIP Archaeology
The Day I Hacked XCTrack
blog.syrac.org·7h·
Discuss: Hacker News
🔐PKI Archaeology
Microsoft Adds Agentic AI Capabilities to Sentinel
darkreading.com·6h
📊Homelab Monitoring
Ghosts in the Code: A Memorial Grove for Deleted AI
connectingminds.uk·1d·
Discuss: DEV, Hacker News
🏺Protocol Archaeology
Walrus, A 1M ops/sec, 1 GB/s Write Ahead Log in Rust
nubskr.com·3d·
💿ZFS Internals
Building Actual Peer-to-peer Applications: Outside Misconceptions
hackernoon.com·2d
🌐Distributed Hash
Open Lineage
usenix.org·18h
🔌Interface Evolution
Metasploit Wrap Up 10/09/2025
rapid7.com·1d
🛡️eBPF Security
Ship Broken Things
matmul.net·1d·
Discuss: Hacker News
🔗Topological Sorting
Learning from software errors – Part 3: A Mars probe gets out of control
heise.de·14h
📞Session Types
Implementing ZADD If Key Exists
rozumem.xyz·16h·
Discuss: Hacker News
Redis Internals
Is the End of Detection-Based Security Here?
thenewstack.io·6h
🎯Threat Hunting
How we built a structured Streamlit Application Framework in Snowflake
about.gitlab.com·22h
🌊Streaming Systems
Building Trust for AI Agents — ISM-X: A Privacy-Preserving Identity Layer (with demo)
dev.to·3h·
Discuss: DEV
🌳Archive Merkle Trees
Efficient and accurate search in petabase-scale sequence repositories
nature.com·2d·
Discuss: Hacker News
🔄Burrows-Wheeler
Building Resilient AI Agents on Serverless | Restate
restate.dev·1d·
🧱Immutable Infrastructure