xb.sql and xbi.sql - Explain Oracle Execution Plans Better! (Part 3 - Cardinality Misestimates)
tanelpoder.comยท1d
๐Ÿง Query Planners
Flag this post
What Artifacts Teach Us
systemsapproach.orgยท1d
๐Ÿ“กNetwork Archaeology
Flag this post
H.R.5857 โ€“ Farm Act
congress.govยท1dยท
Discuss: Hacker News
๐Ÿ”CBOR
Flag this post
How to enroll for Windows 10 ESU โ€” Get a year of free Windows 10 Extended Security Updates
tomshardware.comยท13h
๐Ÿ”’Secure Boot
Flag this post
From Signals to Reliability: SLOs, Runbooks and Post-Mortems
fatihkoc.netยท1dยท
๐Ÿ‘๏ธObservatory Systems
Flag this post
Cursor's Composer-1 vs. Windsurf's SWE-1.5: The Rise of Vertical Coding Models
inkeep.comยท3hยท
Discuss: Hacker News
๐ŸงฉWASM Components
Flag this post
The Collapse of Centralized AI Discovery
aivojournal.orgยท1dยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
Flag this post
Backup vulnerabilities android mobile application
infosecwriteups.comยท1d
๐Ÿ’ฃZIP Vulnerabilities
Flag this post
Deploying to Amazon's cloud is a pain in the AWS younger devs won't tolerate
theregister.comยท4h
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Flag this post
Apple reveals a host of iOS and iPadOS security flaws needing urgent attention - so patch now
techradar.comยท13h
๐Ÿ”“Hacking
Flag this post
Cracking XLoader with AI: How Generative Models Accelerate Malware Analysis
blog.checkpoint.comยท1d
๐Ÿฆ Malware Analysis
Flag this post
Part 2: The Role of No-Code in OSS Modernization
dev.toยท8hยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
Flag this post
Nearly 58 billion personal data points have been leaked online since 2004, new study reveals
techradar.comยท4d
๐Ÿ”“Hacking
Flag this post
Building PRRover: A FastAPI GitHub PR Reviewer with Telex A2A Integration
dev.toยท1dยท
Discuss: DEV
โšกgRPC
Flag this post
Hackers Weaponize Remote Tools to Hijack Cargo Freight
darkreading.comยท1d
๐Ÿ•ต๏ธVector Smuggling
Flag this post
How to Optimize Android Apps for Foldable and Wearable Devices?
dev.toยท8hยท
Discuss: DEV
๐Ÿ’พPersistence Strategies
Flag this post
Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Post-Quantum Cryptography Threats
dev.toยท3dยท
Discuss: DEV
๐Ÿ”Quantum Security
Flag this post
Beyond Localhost: Security, Authentication, and Real-World Sources
hackernoon.comยท1d
๐ŸŽฌWebCodecs
Flag this post
AI Wrapper Companies: Is This Real or Just API Theater?
dev.toยท6hยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
Flag this post
Implementing MQTT 5 in Go : a deep dive into client design ( Part I )
reddit.comยท2dยท
Discuss: r/golang
๐Ÿ“‹Format Specification
Flag this post