How Sui Move rethinks flash loan security
blog.trailofbits.com·4d
Hardware Transactional Memory
Overview of security services available in AWS Dedicated Local Zones
aws.amazon.com·4d
🌐Edge Preservation
The dark forest of political communication
andrew-quinn.me·2d·
Discuss: Hacker News
🛡Cybersecurity
Belzebub.ai: AI Deception Platform
beelzebub.ai·5d·
Discuss: Hacker News
🚀Indie Hacking
I Vibe Coded an R Package
jcarroll.com.au·2d·
🇯🇵Japanese Computing
Get Excited About Postgres 18
crunchydata.com·2d·
🗄️PostgreSQL WAL
How I Hire Programmers (2009)
aaronsw.com·2d·
Discuss: Hacker News
🔩Systems Programming
Operational Intelligence – the new horizon of observability
squaredup.com·1d·
Discuss: Hacker News
👁️System Observability
AI-Personalized Welcome Messages for Website Visitors
peteallport.substack.com·4d·
Discuss: Substack
🔗Hypermedia APIs
K2-Think: A Parameter-Efficient Reasoning System
arxiviq.substack.com·2d·
Discuss: Substack
🎯Performance Proofs
Beyond CVE: Crafting a Comprehensive Vulnerability Intelligence Strategy for Modern Security Teams
infosecwriteups.com·5d
🔓Hacking
Ruby Argentina September Meetup
dev.to·2d·
Discuss: DEV
⚔️Lean Tactics
With Docker, use Proxmox for multiple VMs or use MACVLANs to seperate?
reddit.com·2d·
Discuss: r/homelab
🔗Proxmox Clustering
Enhanced Cellulose Nanocrystal Composites via Dynamic Polymer Blending and Reactive Injection Molding
dev.to·1d·
Discuss: DEV
🧪Cassette Chemistry
Transform Lectures into Summaries, Questions, and Blog Ideas with Lecture lab AI
dev.to·5h·
Discuss: DEV
🏛Digital humanities
How to Analyze and Optimize Your LLMs in 3 Steps
towardsdatascience.com·3d
🔗Constraint Handling
ASRock X870 Nova WiFi Motherboard Review: Lots of storage, not without sacrifice
tomshardware.com·3d
Nordic Processors
Getting Started with HTTP/3 in Python
dev.to·4d·
Discuss: DEV
🌐Network Protocols
Unlocking Team Superpowers: The Secret Language of Spatial Harmony by Arvind Sundararajan
dev.to·3d·
Discuss: DEV
🔲Cellular Automata