Overhaul of my dotfiles
markjgsmith.comยท11h
๐ฆFormat Metamorphosis
Flag this post
Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild
unit42.paloaltonetworks.comยท6h
๐ก๏ธeBPF Security
Flag this post
Rate-based versus credit-based flow control: Part 2 โ Notes on flow control
blog.apnic.netยท2h
๐กNetwork Calculus
Flag this post
I Built the Same App 10 Times: Evaluating Frameworks for Mobile Performance
๐ฌWebCodecs
Flag this post
Community Strikes Back: 12 Open Source Projects Born from Resistance
itsfoss.comยท18h
๐Open Source Software
Flag this post
10-26-building-the-rope-operation-for-tensorrent-hardware at Clehaxze
clehaxze.twยท17h
โกSIMD Vectorization
Flag this post
Speedrunning an RL Environment
โ๏ธLean Tactics
Flag this post
Agentic AI introduces new security challenges in era of MCP and A2A
techradar.comยท11h
๐Capability Systems
Flag this post
Pepsi, when they don't have coke
bitecode.devยท1d
๐Brotli Internals
Flag this post
Patch Management is Essential for Securing DevOps
devops.comยท14h
โ๏ธNix Adoption
Flag this post
How I Chose The Tech Stack For Job Helper
playfulprogramming.comยท1d
๐กRSS Automation
Flag this post
The Trojan Example: Jailbreaking LLMs through Template Filling and Unsafety Reasoning
arxiv.orgยท22h
๐NetworkProtocols
Flag this post
An adaptable toolkit to build APIs and agents, with friendly interfaces for streaming, multimodality and integrations
๐Streaming Systems
Flag this post
Loading...Loading more...