A Manifesto for the Programming Desperado
github.com·3h·
Discuss: Hacker News
💻Programming languages
Linear Risk Sharing on Networks
freakonometrics.hypotheses.org·20h
📼Cassette Networks
From Static Rate Limiting to Adaptive Traffic Management in Airbnb’s Key-Value Store
medium.com·1d
🌊Streaming Systems
Living Off the Cloud: Abusing Cloud Services for Red Teaming | Cyber Codex
infosecwriteups.com·7h
🏠Homelab Federation
Tiga: Accelerating Geo-Distributed Transactions with Synchronized Clocks
muratbuffalo.blogspot.com·2d·
🤝Distributed Consensus
An enough week
blog.mitrichev.ch·23h·
🧮Z3 Solver
Learning from software errors – Part 3: A Mars probe gets out of control
heise.de·11h
📞Session Types
Ensuring Safe and Reliable Updates with Qualys TruRisk™ Manifest Version Control
blog.qualys.com·1d
Archive Fixity
Enhanced SoC Design via Adaptive Topology Optimization with Reinforcement Learning
dev.to·16h·
Discuss: DEV
🧩RISC-V
Building Actual Peer-to-peer Applications: Outside Misconceptions
hackernoon.com·2d
🌐Distributed Hash
Triple Threat: Signal's Ratchet Goes Post-Quantum
blog.quarkslab.com·3d
🔐Quantum Security
What's the Role of Trust in AI?
algorithmictradeoff.substack.com·3h·
Discuss: Substack
🔲Cellular Automata
Operable Software
ferd.ca·6h·
Discuss: Hacker News
👁️System Observability
RND1: Simple, Scalable AR-to-Diffusion Conversion
radicalnumerics.ai·23h·
Discuss: Hacker News
💻Local LLMs
WTF Is the Synergic Mode?
malcolmocean.com·56m·
Discuss: Hacker News
Minimalism
Call for full re-election of the NixOS Steering Committee
discourse.nixos.org·3h·
Discuss: Hacker News
🤝Paxos Consensus
Autonomous AI Hacking and the Future of Cybersecurity
schneier.com·8h·
Discuss: Hacker News
🎯Threat Hunting
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.org·15h
🔗Graph Isomorphism
Controlled Release of Microorganisms from Engineered Living Materials
pubs.acs.org·4h·
Discuss: Hacker News
📦METS Packaging