The Why of PGP Authentication
articles.59.caยท1d
๐Ÿ”‘Cryptographic Protocols
Issue 730
iosdevweekly.comยท1d
๐Ÿ”ŒInterface Evolution
Metasploit Wrap Up 10/09/2025
rapid7.comยท1d
๐Ÿ›ก๏ธeBPF Security
Moeve: Controlling resource deployment at scale with AWS CloudFormation Guard Hooks
aws.amazon.comยท4d
๐Ÿ•ธ๏ธMesh Archiving
Building Resilient AI Agents on Serverless | Restate
restate.devยท1dยท
๐ŸงฑImmutable Infrastructure
Walrus, A 1M ops/sec, 1 GB/s Write Ahead Log in Rust
nubskr.comยท4dยท
๐Ÿ’ฟZFS Internals
10 Data + AI Observations for Fall 2025
towardsdatascience.comยท1d
๐ŸŒŠStream Processing
Source of Truth Update โ€“ Friday, October 10, 2025
rubycentral.orgยท5hยท
Discuss: Hacker News
โœ…Archive Fixity
Why Haskell is the perfect fit for renewable energy tech
mrcjkb.devยท3dยท
Discuss: Hacker News
๐ŸงฌFunctional Programming
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.comยท2dยท
๐ŸงฎAlgebraic Datatypes
N8n vs. Windmill vs. Temporal
blog.arcbjorn.comยท1dยท
Discuss: Hacker News
๐ŸŒŠStream Processing
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.orgยท1d
๐Ÿ“Compression Bounds
TCDRM: A Tenant Budget-Aware Data Replication Framework for Multi-Cloud Computing
arxiv.orgยท1d
๐Ÿ’พStorage Replication
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.comยท5dยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
Evaluating Gemini 2.5 Deep Think's math capabilities
epoch.aiยท1dยท
Discuss: Hacker News
๐ŸŽฏPerformance Proofs
Sorting encrypted data without decryption: a practical trick
dev.toยท1dยท
Discuss: DEV
๐Ÿ”Hash Functions
A Manifesto for the Programming Desperado
github.comยท1dยท
Discuss: Hacker News
๐Ÿ’ปProgramming languages
Show HN: Realization Jsmn on a Pure Zig
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”—Concatenative Programming
Building an AI Internal Linking Plugin for WordPress
dev.toยท7hยท
Discuss: DEV
๐ŸŒ€Brotli Internals