Scattered LAPSUS$ Hunters: Salesforce Extortion Campaign UPDATE
krypt3ia.wordpress.com·9h
🎫Kerberos Attacks
Magic Wormhole: Get things from one computer to another, safely
magic-wormhole.readthedocs.io·1d·
Discuss: Hacker News
💿WORM Storage
Redis 101: From a Beginners POV
mrinalxdev.github.io·1d·
Discuss: Hacker News
Redis Internals
**Enhanced DC SQUID Performance via Optimized YBCO Film Microstructure and Automated Annealing**
future.forem.com·3d·
Discuss: DEV
⚛️Quantum Tape
When we can verify a person but recognize nothing–what are we authenticating?
syntheticauth.ai·1d·
Discuss: Hacker News
📼Cassette Hacking
Big Ball of Mud: What You Need to Know About the Antipattern, How to Avoid It, and More
hackernoon.com·1d
🧩WASM Components
CI/CD pipelines with agentic AI: How to create self-correcting monorepos
elastic.co·4d·
Discuss: Hacker News
🔄Reproducible Builds
We built the fastest data replication tool in the world using Go
news.ycombinator.com·4d·
Discuss: Hacker News
🌊Apache Kafka
Building the Brains: Crafting a Customer Support Agent with Strands
dev.to·3d·
Discuss: DEV
⚔️Lean Tactics
From Shell Scripts to Science Agents: How AI Agents Are Transforming Research Workflows
docker.com·1d
🤖AI Curation
ACM SIGSOFT SEN Empirical Software Engineering: Introducing Our New Regular Column
arxiv.org·1d
💧Liquid Types
How Kyverno has Changed Platform Engineering Security -- Pedro Ignacio, Itaú Unibanco
youtube.com·2d
🎫Kerberos History
Why Claude Code's Unix Philosophy Beats Other AI Assistants
dev.to·1d·
Discuss: DEV
🏗️Compiler Archaeology
Data Quality Taxonomy for Data Monetization
arxiv.org·2d
🔗Data Provenance
Build a Perfect Blog with FastAPI: Add User System
dev.to·1d·
Discuss: DEV
🛡️WASM Security
Adaptive Resource Allocation via Hierarchical Bayesian Optimization in Dynamic Environments
dev.to·1d·
Discuss: DEV
🌊Streaming Systems
SMS: Self-supervised Model Seeding for Verification of Machine Unlearning
arxiv.org·3d
🧠Machine Learning