22.00.0161 Work log
johnnydecimal.comยท15h
๐Log Parsing
Flag this post
Recapping our inaugural Axe-con Mini event
deque.comยท7h
โ๏ธProof Engineering
Flag this post
Netbird setup and not sure how to approach the endpoint configurations
๐Interface Evolution
Flag this post
The Twilio-Stytch Acquisition: A Watershed Moment for Developer-First CIAM
๐Interface Evolution
Flag this post
C++ move semantics from scratch (2022)
๐ฆRust Borrowing
Flag this post
From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
๐ก๏ธWASM Security
Flag this post
Proactive DDoS Detection and Mitigation in Decentralized Software-Defined Networking via Port-Level Monitoring and Zero-Training Large Language Models
arxiv.orgยท19h
๐กNetwork Monitoring
Flag this post
Create your first MCP server
๐ปHomebrew Protocols
Flag this post
Deploying to Amazon's cloud is a pain in the AWS younger devs won't tolerate
theregister.comยท3h
๐ฅ๏ธSelf-hosted Infrastructure
Flag this post
FreakWAN: A floor-routing WAN implementing a chat over bare-LoRa (no LoRaWAN)
๐ปHomebrew Protocols
Flag this post
Show HN: Extrai โ An open-source tool to fight LLM randomness in data extraction
๐Document Grammar
Flag this post
ScaleCall - Agentic Tool Calling at Scale for Fintech: Challenges, Methods, and Deployment Insights
arxiv.orgยท19h
๐Brotli Internals
Flag this post
Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.comยท2d
๐ฃZIP Vulnerabilities
Flag this post
AMD's Zen 5 RDSEED Issue Is Causing Headaches For Optimized CachyOS Builds
phoronix.comยท10h
๐คPaxos Consensus
Flag this post
LLM-Driven Cost-Effective Requirements Change Impact Analysis
arxiv.orgยท19h
๐Language Evolution
Flag this post
Loading...Loading more...