Keynote: Supply Chain Reaction: A Cautionary Tale in K8s Security - S. Potter & A.G. Veytia
youtube.com·10h
🦀Rust
Flag this post
The cycle of a hit genre
howtomarketagame.com·4h
🦀Rust
Flag this post
Show HN: I built a synth for my daughter
🦀Rust
Flag this post
Alarming runC Flaws Enable Hackers To Exploit Docker Containers For Root Access
hothardware.com·2d
🦀Rust
Flag this post
Commvault Expands End-to-End Identity Resilience: Detect, Log, and Reverse Hard-to-Detect Threats in Active Directory
prnewswire.com·8h
⚡HTMX
Flag this post
💥 Tech Talks Weekly #82
techtalksweekly.io·6h
🦀Rust
Flag this post
Nextcloud didn’t expect competition like this
makeuseof.com·10h
⚡HTMX
Flag this post
The Uselessness of "Fast" and "Slow" in Programming
🦀Rust
Flag this post
Ubuntu's Rust Transition Hits Another Bump as sudo-rs Security Vulnerabilities Show Up
itsfoss.com·9h
🦀Rust
Flag this post
I wrote a short post on the importance of taking the literal perspective on writing scalable code. Code that itself scales over time. Check it out and let me kn...
🦀Rust
Flag this post
MS Task Manager turns 30: Creator reveals how a 'very Unixy impulse' endured in Windows
theregister.com·10h
🦀Rust
Flag this post
Loading...Loading more...