22.00.0161 Work log
johnnydecimal.comยท8h
๐Log Parsing
Flag this post
Recapping our inaugural Axe-con Mini event
deque.comยท58m
โ๏ธProof Engineering
Flag this post
The Infrastructure of Modern Ranking Systems, Part 3: The MLOps Backbone - From Training to Deployment
shaped.aiยท1d
๐๏ธObservatory Systems
Flag this post
Netbird setup and not sure how to approach the endpoint configurations
๐Interface Evolution
Flag this post
C++ move semantics from scratch (2022)
๐ฆRust Borrowing
Flag this post
On Designing Low-Latency Systems for High-Traffic Environments
hackernoon.comยท1d
๐Stream Processing
Flag this post
Proactive DDoS Detection and Mitigation in Decentralized Software-Defined Networking via Port-Level Monitoring and Zero-Training Large Language Models
arxiv.orgยท12h
๐กNetwork Monitoring
Flag this post
Part 4: Building Station Station - Where SDD Helped (and Where It Didn't)
๐๏ธObservatory Systems
Flag this post
Part 4: Building Station Station - Where SDD Helped (and Where It Didn't)
๐๏ธObservatory Systems
Flag this post
Every Sunday, I Refactor Old Code and Itโs the Smartest Habit Iโve Ever Built
๐Reverse engineering
Flag this post
Create your first MCP server
๐ปHomebrew Protocols
Flag this post
FreakWAN: A floor-routing WAN implementing a chat over bare-LoRa (no LoRaWAN)
๐ปHomebrew Protocols
Flag this post
ScaleCall - Agentic Tool Calling at Scale for Fintech: Challenges, Methods, and Deployment Insights
arxiv.orgยท12h
๐Brotli Internals
Flag this post
Show HN: Extrai โ An open-source tool to fight LLM randomness in data extraction
๐Document Grammar
Flag this post
Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.comยท2d
๐ฃZIP Vulnerabilities
Flag this post
Loading...Loading more...