Explainer: Permissions, privacy and TCC
eclecticlight.co·1d
🏠Personal Archives
Flag this post
Perplexity shows how to run monster AI models more efficiently on aging GPUs, AWS networks
go.theregister.com·3d
🏠Homelab Archaeology
Flag this post
Pool allocator in C++23 for simulations / game engines - faster than std::pmr
🧠Memory Allocators
Flag this post
Flatpak Happenings
📦Deflate
Flag this post
Scaling up Prime Video monitoring service reduced costs 90% (archive) (2023)
👁️Observatory Systems
Flag this post
Turning undersea cables into a global monitoring system for seismic and environmental hazards
phys.org·1d
🕸️Mesh Networking
Flag this post
Windows on Gigabyte MZ33-AR1 (AMD Turin) with Coreboot – ACPI and Bug Fixes
🛡️RISC-V Security
Flag this post
Thanks for a Superconference
hackaday.com·17h
🏺Compression Museums
Flag this post
ESET APT Activity Report Q2 2025–Q3 2025
welivesecurity.com·2d
🛡Cybersecurity
Flag this post
Microsoft's data sovereignty: Now with extra sovereignty!
theregister.com·1d
🖥️Self-hosted Infrastructure
Flag this post
Flow control in switch ASICs: Part 3 — Notes on flow control
blog.apnic.net·2d
🌊Stream Processing
Flag this post
Mind the Gap: Missing Cyber Threat Coverage in NIDS Datasets for the Energy Sector
arxiv.org·5d
🏠Homelab Pentesting
Flag this post
Pro-Russian Hackers Use Linux VMs to Hide in Windows
darkreading.com·4d
🔓Hacking
Flag this post
Gravitational Fragmentation of Molecular Clouds: Towards Predictive Stellar Nursery Mapping with Bayesian Neural Networks
🧠Machine Learning
Flag this post
The Rise of the Specialist: Why Small Language Models are the Future of Enterprise AI
🌀Brotli Internals
Flag this post
Developer Case Study: Cursor and Claude Code Suggested Building a Proxy. Shotgun CLI Found LiteLLM Instead.
👁️Observatory Systems
Flag this post
Best way to archive old VMs?
🏠Homelab Preservation
Flag this post
University of Pennsylvania confirms recent cyberattack led to major data theft
techradar.com·2d
🛡Cybersecurity
Flag this post
Loading...Loading more...