New Secure Future Initiative patterns and practices: Practical guides to strengthen security
microsoft.comยท1d
๐ŸŽฏThreat Hunting
Salesforce data breach: what you need to know
fortra.comยท3h
๐ŸŽซKerberos Attacks
The anvil of alignment: The value of monoliths over microservices
testdouble.comยท2d
๐ŸคDistributed Consensus
Introducing the Gemini 2.5 Computer Use model
blog.googleยท23hยท
Discuss: Hacker News
๐ŸŽ™๏ธWhisper
IBM AIX/VIOS: Package manager opens critical security leak
heise.deยท11h
๐Ÿ•ธ๏ธWASM Preservation
Fast Matrix Multiply on an Apple GPU
percisely.xyzยท21hยท
Discuss: Hacker News
โšกSIMD Vectorization
The (software) quality without a name
kieranpotts.comยท1dยท
๐ŸŽจSwedish Design Philosophy
I pushed Python to 20,000 requests sent/second. Here's the code and kernel tuning I used.
tjaycodes.comยท1d
๐ŸŒŠStream Processing
Redis patches 13-Year-Old Lua flaw enabling Remote Code Execution
securityaffairs.comยท9h
๐ŸŒWASI
Ask HN: Systems Development Path
news.ycombinator.comยท4dยท
Discuss: Hacker News
๐Ÿฆ€Rust Borrowing
Pharmaceutical Software Development: Ensuring Data Integrity and Regulatory Compliance
dev.toยท5hยท
Discuss: DEV
๐Ÿ”—Supply Chain
When Claudeโ€™s 'Help' Turns Harmful: A Developerโ€™s Cautionary Tale
dev.toยท1hยท
Discuss: DEV
โš”๏ธLean Tactics
LLM Data Detox: Erasing the Past for a Brighter AI Future
dev.toยท1dยท
Discuss: DEV
๐Ÿ’ปLocal LLMs
Claude API: Complete Guide to Anthropic's AI Platform in 2025
dev.toยท2hยท
Discuss: DEV
๐ŸŒณIncremental Parsing
From Neural Activity to Computation: Biological Reservoirs for Pattern Recognition in Digit Classification
arxiv.orgยท14h
๐Ÿ”ฒCellular Automata
Asus ROG Control Center for Linux
github.comยท13hยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
High-Entropy Alloy Coating Performance Prediction via Bayesian Optimization & Microstructural Feature Fusion
dev.toยท1dยท
Discuss: DEV
โš™๏ธTape Engineering
I tested this rugged SSD in water, dirt and a backpack โ€“ and it still works perfectly
techradar.comยท1d
๐Ÿ’พPersistence Strategies