pqr.sql: Generate QR Codes with Pure SQL in PostgreSQL
tanelpoder.com·6h
🧩SQLite Extensions
New Articles: Journal of Contemporary Archival Studies
archivespublishing.com·2d
⚖️Archive Ethics
103: We Can’t Trust
mwl.io·2d
💾Persistence Strategies
The story of Bram Cohen and the BitTorrent protocol
xda-developers.com·16h
🌊BitTorrent
From Static Rate Limiting to Adaptive Traffic Management in Airbnb’s Key-Value Store
medium.com·2d
🌊Streaming Systems
The Legacy Code Survival Guide: Add Features Without Fear
understandlegacycode.com·4d
🔓Decompilation
Synology Reverses Course on Some Drive Restrictions
hardware.slashdot.org·3d
FLAC Verification
1990s Millport CNC Vertical Mill Revival
salvagedcircuitry.com·6h·
Discuss: Hacker News
⚙️Modern Assembly
The artificial complexity of OOXML files (the PPTX case)
blog.documentfoundation.org·1d·
Discuss: Hacker News
📟Terminal Typography
Source of Truth Update – Friday, October 10, 2025
rubycentral.org·18h·
Discuss: Hacker News
Archive Fixity
Revisiting Karpathy's 'Unreasonable Effectiveness of Recurrent Neural Networks'
gilesthomas.com·1d·
Discuss: Hacker News
🎧Learned Audio
Kubernetes 1.34 Features Explained
scaleops.com·2d·
Discuss: Hacker News
📦Container Security
The A.I. Prompt That Could End the World
nytimes.com·1d·
Proof Automation
ksmbd - Exploiting CVE-2025-37947 (3/3)
blog.doyensec.com·4d·
📦Container Security
Defeating Return Type Polymorphism
philipphagenlocher.de·3d·
Discuss: Hacker News
🧬Functional Programming
OBCache: Optimal Brain KV Cache Pruning for Efficient Long-Context LLM Inference
arxiv.org·2d
💻Local LLMs
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.com·1d·
Discuss: Hacker News
🎫Kerberos Exploitation
Programmer in Wonderland
binaryigor.com·2d·
Discuss: Hacker News
🔩Systems Programming