Somatic mutation and selection at population scale
nature.comยท1d
๐ŸงฌCopy Number Variants
original โ†—
whynothugo.nlยท21h
๐ŸŒŠStreaming Systems
How to Tame Varnish Memory Usage Safely
fastly.comยท21h
๐ŸŽฏPerformance Forensics
Clop is a Big Fish, But Not Worth Hunting
news.risky.bizยท19h
๐Ÿ”“Hacking
Walrus, A 1M ops/sec, 1 GB/s Write Ahead Log in Rust
nubskr.comยท2dยท
๐Ÿ’ฟZFS Internals
Hacking the Humane AI Pin
writings.agg.imยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธARM TrustZone
Westin's Four States of Privacy
marcusolsson.devยท10hยท
Discuss: Hacker News
๐Ÿ”’Privacy Archives
Mathematical model of memory suggests 7 senses are optimal
skoltech.ruยท3hยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.comยท4dยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
Self-Extracting F3
buttondown.comยท3dยท
Discuss: Hacker News
โœ…Format Verification
1k LEDs Is No Limit
xayax.netยท10hยท
โšกHomebrew CPUs
Three Solutions to Nondeterminism in AI
blog.hellas.aiยท1dยท
Discuss: Hacker News
๐ŸŽฏPerformance Proofs
TRIM: Token-wise Attention-Derived Saliency for Data-Efficient Instruction Tuning
arxiv.orgยท17h
๐Ÿ”จCompilers
Show HN: Using an LLM to sensibly sort a shopping receipt
treblig.orgยท8hยท
Discuss: Hacker News
๐Ÿ”—Constraint Handling
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.ioยท3hยท
Discuss: Hacker News
๐Ÿ”Capability Systems
From Static Rate Limiting to Adaptive Traffic Management in Airbnbโ€™s Key-Value Store
medium.comยท5h
๐ŸŒŠStreaming Systems
Keyboard Holders, Generation 1
cceckman.comยท6hยท
Discuss: Hacker News
โŒจ๏ธMechanical Keyboards
ObCLIP: Oblivious CLoud-Device Hybrid Image Generation with Privacy Preservation
arxiv.orgยท2d
๐Ÿ”Homomorphic Encryption
Show HN: Twoway, a Go package for HPKE encrypted request-response flows
github.comยท1dยท
๐Ÿ”‘Cryptographic Protocols
Turning data into knowledge: How Huawei is upgrading storage for the AI era
techradar.comยท5h
๐Ÿ’พPersistence Strategies