Anthropic finds 250 poisoned documents are enough to backdoor large language models
the-decoder.comยท22h
๐Ÿ”Vector Forensics
Advanced ZFS Dataset Management: Snapshots, Clones, and Bookmarks
klarasystems.comยท2d
๐Ÿ“ธZFS Snapshots
Issue 730
iosdevweekly.comยท1d
๐Ÿ”ŒInterface Evolution
How to Save the World with ZFS and 12 USB Sticks: 4th Anniversary Video (2011)
constantin.glez.deยท15hยท
Discuss: Hacker News
๐Ÿ’ฟZFS Archaeology
Efficient and accurate search in petabase-scale sequence repositories
nature.comยท2dยท
Discuss: Hacker News
๐Ÿ”„Burrows-Wheeler
Westin's Four States of Privacy
marcusolsson.devยท2dยท
Discuss: Hacker News
๐Ÿ”’Privacy Archives
Software Architecture Horror Story
blog.mihaisafta.comยท5hยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
pgtricks โ€“ two tools for backing up PostgreSQL database dumps
github.comยท18hยท
Discuss: Hacker News
๐ŸŒณGit Internals
A new breed of analyzers
daniel.haxx.seยท1dยท
๐Ÿ›Fuzzing
The Absolute Minimum Every Developer Must Know About Unicode and Character Sets
joelonsoftware.comยท3dยท
Discuss: Hacker News
๐Ÿ”คCharacter Encoding
I Built the Perfect Workflow and attracted some friends in the process
graemefawcett.caยท13hยท
Discuss: Hacker News
โšกProof Automation
Organizations, Like Code, Deserve Refactoring
robbyonrails.comยท1dยท
Discuss: Hacker News
๐Ÿ”„Language Evolution
The People Rescuing Forgotten Knowledge Trapped On Old Floppy Disks
it.slashdot.orgยท15h
๐Ÿ’ฝFloppy disks
From Millions to Billions
geocod.ioยท3dยท
Discuss: Hacker News
๐Ÿ—„๏ธDatabase Internals
Show HN: I built a LSP with its own parser to learn Rust
github.comยท8hยท
Discuss: Hacker News
โšกDependent Rust
Love C, Hate C: Web Framework Memory Problems
alew.isยท1dยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
Fundamental Interconnectedness of All Things on Talking Postgres Podcast
talkingpostgres.comยท11hยท
Discuss: Hacker News
๐ŸงฌPostgreSQL Forensics
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.ioยท1dยท
Discuss: Hacker News
๐Ÿ”Capability Systems
Show HN: Using an LLM to sensibly sort a shopping receipt
treblig.orgยท2dยท
Discuss: Hacker News
๐Ÿ”—Constraint Handling