Evolution of Apple Security Bounty Program
mjtsai.com·1d
🛡️RISC-V Security
Terraform Fileset Function: Filter and Deploy Specific Files
spacelift.io·1d·
Discuss: Hacker News
🧊Arctic Storage
Datadog supports PyPI and the Python community through observability
opensource.datadoghq.com·2d·
Discuss: Hacker News
🎓Academic Torrents
Recording your mouse and keyboard with python
andrewpwheeler.com·1d·
Discuss: Hacker News
🤖Tape Automation
Grafana Labs Extends AI Capabilities of Observability Platform
devops.com·1d
🏠Homelab Automation
Sony Teases New GPU Tech For the PS6
games.slashdot.org·17h
🏺Gaming Archaeology
My Cognitive Dissonance
studium.dev·3d·
Discuss: Hacker News
🚀Indie Hacking
Let's Write a Macro in Rust
hackeryarn.com·1d·
🦀Rust Macros
Ubuntu Engineering in 2025: A Retrospective
jnsgr.uk·3d·
Discuss: Hacker News
🔌Operating system internals
From Toil to Empowerment: Building Self-Service Ingress with GitOps
usenix.org·1d
🕸️Mesh Networking
Kdenlive 25.08.2 Released with Stability Fixes and Polished Effects
linuxiac.com·1d
🕸️WASM Archives
Detecting and Mitigating Insertion Hallucination in Video-to-Audio Generation
arxiv.org·1d
👁️Perceptual Coding
We Benchmarked DuckDB, SQLite, and Pandas on 1M Rows: Here’s What Happened
kdnuggets.com·1d
💾SQLite
Automated Copyright Infringement Detection via Semantic Fingerprinting and Dynamic Thresholding
dev.to·3d·
Discuss: DEV
👁️Perceptual Hashing
Chaos Ransomware Upgrades with Aggressive New C++ Variant
darkreading.com·2d
🔓Hacking
QUIC! Jump to User Space!
hackaday.com·1d
🌐Network Protocols
Juniper Security Director: Attackers can bypass security mechanism
heise.de·12h
🔓Hacking
Automated Genotoxicity Screening via Microfluidic-Integrated Raman Spectroscopy and Machine Learning
dev.to·1d·
Discuss: DEV
🌈Spectroscopy