Hashers (Murmur)
github.comยท3d
๐Ÿ”Hash Functions
Exploring Canton: a privacy-preserving distributed ledger for finance
quant.engineeringยท1dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Bodega: Serving Linearizable Reads Locally from Anywhere at Anytime via Roster Leases
arxiv.orgยท1d
๐ŸŒIPFS
Neo4j cozies up to Microsoft as 'property sharding' promises to overcome scalability struggle
theregister.comยท15h
๐Ÿ“ŠGraph Databases
Open source all the way down at APNIC 60
blog.apnic.netยท19h
๐Ÿ›ก๏ธeBPF Programs
Quantum Networks: Taming the Chaos with Intelligent Routing by Arvind Sundararajan
dev.toยท17hยท
Discuss: DEV
๐Ÿ”Quantum Security
A Timeline of Public Key Infrastructure: What Worked, What Failed, and Whatโ€™s Next
hackernoon.comยท2d
๐Ÿ”PKI Archaeology
August 2025 Detection Highlights: 9 New VTIs, 20+ YARA Rules, and More Advanced Malware Insights
vmray.comยท17h
๐Ÿฆ Malware Analysis
Some musings on the Metric system
boston.conman.orgยท1h
๐Ÿท๏ธMetadata Standards
Dispelling Myths of Open Source Complexity With Apache Iceberg
thenewstack.ioยท10h
๐Ÿ”ŒInterface Evolution
Elastic Metal: From Game Servers to Global Infrastructure
blog.hathora.devยท12hยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
I built an interactive bloom filter visual simulator so you can understand this data structure better
coffeebytes.devยท2dยท
Discuss: r/programming
๐ŸŒธBloom Filters
OSCP Tactics: Tunneling and Port Forwarding
infosecwriteups.comยท21h
๐Ÿ›ฃ๏ธBGP Hijacking
Shamir's Secret Sharing
en.wikipedia.orgยท1dยท
Discuss: Hacker News
๐Ÿ”Hash Functions
Working in Groups
internet.placeยท1dยท
๐Ÿ”ŒInterface Evolution
RSS 23 years on
rsdoiel.github.ioยท1d
๐Ÿ“กFeed Archaeology
The Evolution of Logical Replication in PostgreSQL
enterprisedb.comยท10hยท
Discuss: Hacker News
๐ŸคDistributed Consensus
Powering Crypto Workloads with Sub-100ms Latency
risingwave.comยท18hยท
Discuss: Hacker News
๐ŸŒŠStream Processing
Postgres 18rc1 vs sysbench
smalldatum.blogspot.comยท8hยท
๐Ÿ—„๏ธPostgreSQL WAL
AdaptixC2: A New Open-Source Framework Leveraged in Real-World Attacks
unit42.paloaltonetworks.comยท1d
๐Ÿ”’WASM Capabilities