The Much Shortened List of My Distributed Self
zylstra.org·1d
🛡️Privacy Engineering
Flag this post
The social contract of open source
snarky.ca·2h·
Discuss: Hacker News
compliance
Flag this post
A Plan for 5-10%* Faster Free-Threaded JIT by Python 3.16
fidget-spinner.github.io·6h·
🔒MLSecOps
Flag this post
Intel's former staffer accused of stealing 18,000 'Top Secret' files, worked there for 10 years
tweaktown.com·14h
🛠cybersecurity
Flag this post
A Guide to My Organizational Workflow
cachestocaches.com·4d·
Discuss: Hacker News
compliance
Flag this post
HTB Starting Point: Mongod
infosecwriteups.com·16h
compliance
Flag this post
New comment by kobieps in "Ask HN: Who is hiring? (November 2025)"
journeyapps.com·4d·
Discuss: Hacker News
compliance
Flag this post
Data rescue for World Digital Preservation Day 2025
erambler.co.uk·3d
🛠cybersecurity
Flag this post
How to Scale Analytics When You’re Tracking Billions of Events Without Exploding Cost
mitzu.io·2d·
Discuss: DEV
compliance
Flag this post
Using AI to modernize mainframes: Turning legacy tech into a strategic advantage
nordot.app·3d
⚖️AI Governance
Flag this post
Cybersecurity Alert as PolarEdge Botnet Hijacks 25,000 IoT Systems Globally
blogger.com·19h
🛠cybersecurity
Flag this post
What is generative AI? How artificial intelligence creates content
infoworld.com·1d
⚖️AI Governance
Flag this post
Federated Learning in 2025: What You Need to Know
dev.to·1d·
Discuss: DEV
⚖️AI Governance
Flag this post
Improving Reliability and Quality of AI Agents in Production
dev.to·2d·
Discuss: DEV
⚖️AI Governance
Flag this post
Advanced Hydraulic Fracture Optimization for Enhanced Reservoir Connectivity in Clay-Rich Dam Foundations
dev.to·8h·
Discuss: DEV
⚠️Risk Management
Flag this post
How to Automate GitHub Workflows with Gemini CLI and the MCP Toolkit for Docker
dev.to·8h·
Discuss: DEV
🔒MLSecOps
Flag this post
🏗️ Mastering Infrastructure as Code: From Manual Chaos to Multi-Cloud Orchestration [Week-7—P1] ⚡
linkedin.com·2d·
Discuss: DEV
🔒MLSecOps
Flag this post
On Pretraining for Project-Level Code Completion
paperium.net·1d·
Discuss: DEV
🔒MLSecOps
Flag this post
A diffusion-based multi-modal anomaly detection approach for data communication in TACS
sciencedirect.com·1d
🛠cybersecurity
Flag this post
The App You Trust Most Is the One That Spies the Hardest
dev.to·1d·
Discuss: DEV
🛡️Privacy Engineering
Flag this post