EuroBSDCon 2025 report (1/2) – arrival & tutorial days
eerielinux.wordpress.com·21h
🖥️Terminal Renaissance
Flag this post
PhantomVAI Loader Delivers a Range of Infostealers
unit42.paloaltonetworks.com·1d
🕵️Vector Smuggling
Flag this post
Unkey API middleware
unkey.com·21h
⚡gRPC
Flag this post
Compiling static Nmap binary for jobs in restricted environments
pentestpartners.com·2d
💣ZIP Vulnerabilities
Flag this post
So you want to build a data mesh
🕸️Mesh Archiving
Flag this post
Memory and storage prices will only get worse, Adata CEO says
techspot.com·2h
💰Preservation Economics
Flag this post
How Meta Is Leveraging AI To Improve the Quality of Scope 3 Emission Estimates for IT Hardware
engineering.fb.com·1d
⚡Incremental Computation
Flag this post
Done with Windows! Every one of these guys will be running Linux at the end of the day.
🔌Operating system internals
Flag this post
First look at the DGX Spark
🖥️Terminal Renaissance
Flag this post
Automated Anomaly Detection in Semiconductor Wafer Mapping via Hyperdimensional Vector Analysis
🔍Vector Forensics
Flag this post
Intel Announces "Crescent Island" Inference-Optimized Xe3P Graphics Card With 160GB vRAM
🖥️Modern Terminals
Flag this post
EFX Allocations and Orientations on Bipartite Multi-graphs: A Complete Picture
arxiv.org·11h
🔄Graph Rewriting
Flag this post
Copy-and-Patch: A Copy-and-Patch Tutorial
🦀Rust Macros
Flag this post
Exporing Reactive Databases – Convex.dev
🔄Lens Laws
Flag this post
New automated cybersecurity solution for vulnerability detection and remediation
✅Archive Fixity
Flag this post
Apple Debuts New 14” MacBook Pro with the M5 Chip
macstories.net·1d
🖥️Vintage Macintosh
Flag this post
Loading...Loading more...