Webcast recap: How North Carolina secures 2,700 schools with one shared view
runzero.comยท10h
๐Network Security
Flag this post
DSQL: Keeping Your Pager Quiet
brooker.co.zaยท2d
๐๏ธDatabase Internals
Flag this post
Asking Our Documents the Right Questions โ Locally
manas.techยท1d
๐Archival Workflows
Flag this post
Context Engineering: The Foundation for Reliable AI Agents
thenewstack.ioยท3d
๐Streaming Systems
Flag this post
The Louvre's surveillance system used insecure passwords such as "LOUVRE"
๐Cryptographic Archaeology
Flag this post
xb.sql and xbi.sql - Explain Oracle Execution Plans Better! (Part 3 - Cardinality Misestimates)
tanelpoder.comยท18h
๐ง Query Planners
Flag this post
Hou Tu Pranownse Inglish
๐ฃ๏ธCMU Pronouncing
Flag this post
I was tired of 50ms+ shell latency, so I built a sub-millisecond prompt in Rust (prmt)
๐ฆRust Macros
Flag this post
The Year of a Thousand Rooms
๐Cultural Algorithms
Flag this post
FreakWAN: A floor-routing WAN implementing a chat over bare-LoRa (no LoRaWAN)
๐ปHomebrew Protocols
Flag this post
How I Cracked the eJPT Exam in Just 3 Hours with a Score of 85%
infosecwriteups.comยท15h
๐ต๏ธPenetration Testing
Flag this post
Culture Cartography: Mapping the Landscape of Cultural Knowledge
arxiv.orgยท19h
๐Cultural Algorithms
Flag this post
The Backbone Breaker Benchmark: Testing the Real Security of AI Agents
๐ฏThreat Hunting
Flag this post
Using Salient Object Detection to Identify Manipulative Cookie Banners that Circumvent GDPR
arxiv.orgยท19h
๐งญContent Discovery
Flag this post
Structurally Valid Log Generation using FSM-GFlowNets
arxiv.orgยท3d
๐Log Parsing
Flag this post
Loading...Loading more...