How an Attacker Drained $128M from Balancer Through Rounding Error Exploitation
research.checkpoint.com·8m
🦀Rust
Flag this post
Ehxb | Race Conditions Vulnerabilities I
infosecwriteups.com·2d
🔬eBPF
Flag this post
Inside Mercado Libre's multi-faceted Spanner architecture
cloud.google.com·1d
⚡Performance
Flag this post
Flexible modulation of hybrid feedback loops in competitive biological oscillators
nature.com·2d
🦀Rust
Flag this post
Going From Reactive to Predictive Incident Response with AIOps
hackernoon.com·14h
🔬eBPF
Flag this post
Identifying Linux Kernel Instability Due to Poor RCU Synchronization
arxiv.org·1d
🦀Rust
Flag this post
Balancing Cost, Power, and AI Performance
oreilly.com·17h
📮Message Queues
Flag this post
Playing Around with ARM Assembly
🦀Rust
Flag this post
C++ move semantics from scratch (2022)
🦀Rust
Flag this post
DCcluster-Opt: Benchmarking Dynamic Multi-Objective Optimization for Geo-Distributed Data Center Workloads
arxiv.org·1d
🔗Distributed Systems
Flag this post
When numbers lie: the Java equality bug every dev hits at least once
🏗️Database Internals
Flag this post
Hydra: Dual Exponentiated Memory for Multivariate Time Series Analysis
arxiv.org·1d
🦀Rust
Flag this post
Loading...Loading more...