How did we cope? (an ode to 8-bits)
aardvark.co.nz·5h
🕹️Retro Gaming
Flag this post
5 Essential Steps to Strengthen Kubernetes Egress Security
tigera.io·5h
📦Container Security
Flag this post
Architecting Multi-System Production Platform: Event Processing Driving $400M+ Across 15,000+ Orgs
engineering.salesforce.com·6h
🌊Streaming Systems
Flag this post
Securing the Wireless Perimeter: Modern Threats to AI, Hyperscale, Enterprise, and Classified Data Centers
bastille.net·9h
🕸️Mesh Networking
Flag this post
Agentic AI and Security
💻Local LLMs
Flag this post
Recent Rust Changes
🦀Rust Borrowing
Flag this post
Keeping the Internet fast and secure: introducing Merkle Tree Certificates
🌳Archive Merkle Trees
Flag this post
Fil-C: A memory-safe C implementation
🧠Separation Logic
Flag this post
Atexit() Is Broken
🐚Bash Monads
Flag this post
Calligraphers and Storytellers
🇯🇵Japanese Computing
Flag this post
The New Calculus of AI-based Coding
🔄Reproducible Builds
Flag this post
The seven second kernel compile
💾Memory Mapping
Flag this post
WSUS attacks hit 'multiple' orgs as Google and other infosec sleuths ring Redmond’s alarm bell
theregister.com·22h
🔓Hacking
Flag this post
Modern Perfect Hashing
🧪Binary Fuzzing
Flag this post
Sparse Adaptive Attention “MoE”: How I Solved OpenAI’s $650B Problem With a £700 GPU
🌊Streaming Algorithms
Flag this post
Loading...Loading more...