The ReD Hat Consulting Breach โ€“ An Analysis
digitalforensicsmagazine.comยท3h
๐Ÿ”“Hacking
A First Look at the Lifecycle of DL-Specific Self-Admitted Technical Debt
arxiv.orgยท9h
๐Ÿ“Code Metrics
Souvenir
deprogrammaticaipsum.comยท1d
๐Ÿ”ฉSystems Programming
rblhost: Exploring Rustโ€™s Role in Embedded Development Tools
mcuoneclipse.comยท1d
๐Ÿฆ€Embedded Rust
Inside the Unified Log 4: Log entries
eclecticlight.coยท1d
๐Ÿ“Log Parsing
How To Build Effective Technical Guardrails for AI Applications
towardsdatascience.comยท19h
๐Ÿ”—Constraint Handling
Working for a Vendor with David Gee
blog.ipspace.netยท7h
๐ŸงฒRISC-V Archaeology
Embedding Lua in Nim
lambdacreate.comยท1d
๐Ÿฆ€Rust Macros
RediShell: Critical Remote Code Execution
wiz.ioยท15hยท
Discuss: Hacker News
๐Ÿ“ฆContainer Security
A Global Mining Dataset
tech.marksblogg.comยท1dยท
Discuss: Hacker News
๐Ÿ“ฆMETS Containers
CPU Cache-Friendly Data Structures in Go: 10x Speed with Same Algorithm
skoredin.proยท1dยท
Discuss: Hacker News
๐Ÿ’จCache Optimization
Design Principle: Composable Services
sleepingpotato.comยท1dยท
Discuss: Hacker News
โšกgRPC
Obelisk 0.25.4 and handling of WASM traps
obeli.skยท1dยท
๐ŸšShell Monads
A Primer on Memory Consistency and Cache Coherence, Second Edition
link.springer.comยท1dยท
Discuss: r/programming
โšกCache Coherence
Evading the Watchful Eye: A Red Teamerโ€™s Guide to EDR Bypass Techniques
medium.comยท1d
๐Ÿ”Cryptographic Archaeology
Testing two 18 TB white label SATA hard drives from datablocks.dev
ounapuu.eeยท1dยท
Discuss: Hacker News
๐Ÿ Homelab Preservation
Moeve: Controlling resource deployment at scale with AWS CloudFormation Guard Hooks
aws.amazon.comยท1h
๐Ÿ•ธ๏ธMesh Archiving
LLM Optimization Notes: Memory, Compute and Inference Techniques
gaurigupta19.github.ioยท22hยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
Cap'n Proto in WASM
mikel.xyzยท1dยท
Discuss: Hacker News
๐ŸŒWASI
Litestream v0.5.0 is Here
simonwillison.netยท3d
๐Ÿ”„Sync Engine