Webcast recap: How North Carolina secures 2,700 schools with one shared view
runzero.comยท10h
๐ŸŒNetwork Security
Flag this post
DSQL: Keeping Your Pager Quiet
brooker.co.zaยท2d
๐Ÿ—„๏ธDatabase Internals
Flag this post
Asking Our Documents the Right Questions โ€” Locally
manas.techยท1d
๐Ÿ”„Archival Workflows
Flag this post
Context Engineering: The Foundation for Reliable AI Agents
thenewstack.ioยท3d
๐ŸŒŠStreaming Systems
Flag this post
The Louvre's surveillance system used insecure passwords such as "LOUVRE"
redhotcyber.comยท10hยท
Discuss: Hacker News
๐Ÿ”Cryptographic Archaeology
Flag this post
xb.sql and xbi.sql - Explain Oracle Execution Plans Better! (Part 3 - Cardinality Misestimates)
tanelpoder.comยท18h
๐Ÿง Query Planners
Flag this post
Hou Tu Pranownse Inglish
zompist.comยท1dยท
Discuss: Hacker News
๐Ÿ—ฃ๏ธCMU Pronouncing
Flag this post
The Curious Case of the Bizarre, Disappearing Captcha
wired.comยท13hยท
๐Ÿ”“Hacking
Flag this post
I was tired of 50ms+ shell latency, so I built a sub-millisecond prompt in Rust (prmt)
reddit.comยท5hยท
Discuss: r/rust
๐Ÿฆ€Rust Macros
Flag this post
The Year of a Thousand Rooms
dxdt.chยท4hยท
Discuss: Hacker News
๐ŸŒCultural Algorithms
Flag this post
FreakWAN: A floor-routing WAN implementing a chat over bare-LoRa (no LoRaWAN)
github.comยท4hยท
Discuss: Hacker News
๐Ÿ“ปHomebrew Protocols
Flag this post
How I Cracked the eJPT Exam in Just 3 Hours with a Score of 85%
infosecwriteups.comยท15h
๐Ÿ•ต๏ธPenetration Testing
Flag this post
How to Data Engineer the ETLFunnel Way
dev.toยท2dยท
Discuss: DEV
๐ŸŒŠStream Processing
Flag this post
How AI is Transforming Financial Compliance Processes
dev.toยท14hยท
Discuss: DEV
โš–๏ธLegal Compliance
Flag this post
Culture Cartography: Mapping the Landscape of Cultural Knowledge
arxiv.orgยท19h
๐ŸŒCultural Algorithms
Flag this post
The Backbone Breaker Benchmark: Testing the Real Security of AI Agents
lakera.aiยท4dยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
Flag this post
Java's Agentic Framework Boom Is a Code Smell
gnanaguru.comยท2dยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
Flag this post
Using Salient Object Detection to Identify Manipulative Cookie Banners that Circumvent GDPR
arxiv.orgยท19h
๐ŸงญContent Discovery
Flag this post
Structurally Valid Log Generation using FSM-GFlowNets
arxiv.orgยท3d
๐Ÿ“Log Parsing
Flag this post
Good abstractions for humans turn out to be good abstractions for LLMs
betweentheprompts.comยท9hยท
Discuss: Hacker News
โœจEffect Handlers
Flag this post