CBOR vs. the Other Guys
cborbook.comยท4dยท
Discuss: Hacker News
๐Ÿ“‹Protocol Buffers
Flag this post
Build a Multi-Tenant RAG with Fine-Grain Authorization using Motia and SpiceDB
dev.toยท1dยท
Discuss: DEV
๐Ÿ”„Archival Workflows
Flag this post
10 Essential Java Libraries - How Essential Are They Really?
hackernoon.comยท1d
๐Ÿ“Concrete Syntax
Flag this post
rpki-client seeks โ‚ฌ300K in funding by 2026 to sustain development
discoverbsd.comยท2d
๐Ÿ”ŒOperating system internals
Flag this post
Dingo: A Meta-Language for Go
github.comยท6hยท
๐Ÿฆ€Rust Macros
Flag this post
Percona Brings Transparent Data Encryption to Postgres
thenewstack.ioยท1d
๐Ÿ—„๏ธPostgreSQL WAL
Flag this post
Agent design is still hard
simonwillison.netยท7h
๐Ÿ”Capability Systems
Flag this post
TokenHolder Hack Analysis
blog.verichains.ioยท18h
๐ŸŽซKerberos Attacks
Flag this post
Integrations
theprogrammersparadox.blogspot.comยท2dยท
๐Ÿ”ŒInterface Evolution
Flag this post
Python Certifi and Custom CAs
zufallsheld.deยท15hยท
Discuss: Hacker News
๐ŸงชCBOR Fuzzing
Flag this post
Post-quantum vaults are live on Bitcoin Cash's Chipnet
blog.bitjson.comยท15hยท
Discuss: Hacker News
๐Ÿ”—Hash Chains
Flag this post
Type-safe `net/rpc` alternative with context support
reddit.comยท12hยท
Discuss: r/golang
โšกgRPC
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
stack.int.movยท11hยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Flag this post
Building a Distributed Database in Elixir (Part 2: Architecture and the Beam)
medium.comยท1dยท
Discuss: Hacker News
๐ŸคDistributed Consensus
Flag this post
Taming the Beast: The Move To Declarative API Validation in Kubernetes - Yongrui Lin, Google
youtube.comยท1d
โœ…Format Validation
Flag this post
eBPF and Go in Production: Network Monitoring and Security
skoredin.proยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Programs
Flag this post
Cross-referencing code and specs for maintainability (2024-03-21)
ueber.netยท1dยท
Discuss: Hacker News
๐ŸŒNetworkProtocols
Flag this post
AI Agent Security: Why Reliability Is the Missing Defense Against Data
composio.devยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธError Boundaries
Flag this post
OSS Friday Update
noteflakes.comยท1dยท
๐Ÿ”ฉSystems Programming
Flag this post