Managing dependency graph in a large codebase
tweag.ioยท23h
๐Ÿ“ŠDependency Graphs
Untangling the Impossible: Diagnosing Constraint Conflicts in Boolean Models
dev.toยท15hยท
Discuss: DEV
๐ŸงฎConstraint SMT
Solving Impossible Problems
aha.ioยท7hยท
Discuss: Hacker News
โšกProof Automation
CISAโ€™s new SBOM standards shift beyond checkbox security
reversinglabs.comยท8h
๐Ÿ“‹Format Specification
Bluefin LTS Released: Immutable Desktop on CentOS Stream 10
linuxiac.comยท3h
๐Ÿ”“Open Source Software
The Hidden Costs of Rushing Open Source Upgrades
thenewstack.ioยท2d
๐Ÿ”“Open Source Software
GWSC Three Factor Authentication RFC (Draft-GWC-27001-3A)
gwsc-3fa.orgยท6hยท
Discuss: Hacker News
๐Ÿ”Capability Systems
mstorsjo/llvm-mingw
github.comยท21h
๐Ÿ”—Static Linking
The Ultimate Guide to Linux Default Package Managers
maketecheasier.comยท2dยท
Discuss: Hacker News
๐Ÿ“ฆPackage Managers
How we built a flywheel to steadily improve security for Amazon RDS
aws.amazon.comยท1d
๐Ÿ‘๏ธObservatory Systems
Shai-Hulud Attacks Shake Software Supply Chain Security Confidence
devops.comยท6h
๐Ÿ”’WASM Capabilities
Filter the tools from MCP servers
blog.pamelafox.orgยท6hยท
โšกProof Automation
Supply chain attacks are the new big thing (2022)
cryptologie.netยท2dยท
Discuss: Hacker News
๐Ÿ“ฆPackage Managers
category-labs/monad
github.comยท22h
๐Ÿ”—Functional Compilers
Atomic Distros
nixers.netยท13h
โ„๏ธNix Flakes
FreeBSD Errata Notice FreeBSD-EN-25:17.bnxt
discoverbsd.comยท16h
๐Ÿ›ก๏ธeBPF Security
The Fink Project
finkproject.orgยท1dยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Reasoning Efficiently Through Adaptive Chain-of-Thought Compression: A Self-Optimizing Framework
arxiv.orgยท19h
๐Ÿ—๏ธCompiler Archaeology
Understanding legacy application rewrite vs. refactor tradeoffs
testdouble.comยท1d
๐Ÿ”„Language Evolution
Docker Model Runner General Availability
docker.comยท11h
๐Ÿ”ŒInterface Evolution