Durable execution workflow system based on Postgres
github.comยท6hยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
Flag this post
When do you decide that a storage device hasn't got enough capacity any more?
forums.anandtech.comยท6h
๐ŸŽต8-track Revival
Flag this post
Building a Rules Engine from First Principles
towardsdatascience.comยท1d
๐Ÿ”—Combinatory Logic
Flag this post
AI and the strengthening of records management approaches
thinkingrecords.co.ukยท1d
๐Ÿ“Archive Calculus
Flag this post
The internet was made for privacy
doctorow.medium.comยท3h
๐ŸงฒMagnetic Philosophy
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท5h
๐Ÿ›ก๏ธeBPF Security
Flag this post
The cryptography behind electronic passports
blog.trailofbits.comยท9hยท
Discuss: Hacker News
๐Ÿ”Quantum Security
Flag this post
Registry Analysis
windowsir.blogspot.comยท6hยท
๐Ÿ”NTLM Archaeology
Flag this post
Inside a 34-Petabyte Migration: The True Cost of Moving a Digital Mountain
hackernoon.comยท2d
๐ŸŒEdge Preservation
Flag this post
Never Forget a Thing: Building AI Agents with Hybrid Memory Using Strands Agents
dev.toยท9hยท
Discuss: DEV
๐Ÿ’พPersistence Strategies
Flag this post
Building Up And Sanding Down
endler.devยท20h
๐Ÿ”ฉSystems Programming
Flag this post
A chat with Elizabeth Goodspeed, Casual Archivst
flickr.orgยท1d
๐ŸŒArchive Topology
Flag this post
Three Realisms and The Idea of Sheaves
youtube.comยท1d
๐ŸงฎTheoretical Computer Science
Flag this post
Minimal Sufficiency: A Principle โ€˜Similarโ€™ to End-to-End
cacm.acm.orgยท1hยท
Discuss: Hacker News
๐Ÿ”—Network Calculi
Flag this post
Storing Your Files in The Cloud is Convenient But I Still Back Everything Up on an External Hard Drive. Here's Why:
popularmechanics.comยท2d
๐Ÿ’ฟBackup Strategies
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท20h
๐Ÿ”“Decompilation
Flag this post
Best Open Source Observability Solutions
clickhouse.comยท1hยท
Discuss: Hacker News
๐Ÿ“ŠHomelab Monitoring
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท13h
๐Ÿ”Hash Functions
Flag this post
A problem that takes quantum computers an unfathomable amount of time to solve
phys.orgยท9h
โš›๏ธQuantum Storage
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท10h
๐Ÿ•ต๏ธVector Smuggling
Flag this post