Introducing GenosDB: a P2P Graph Database with Built-In Zero-Trust Security
reddit.com·1h·
Discuss: r/opensource
🧊Iceberg Tables
Implementing ZADD If Key Exists
rozumem.xyz·16h·
Discuss: Hacker News
🧊Iceberg Tables
ACID Properties in DBMS
dev.to·17h·
Discuss: DEV
⚛️Atomic Databases
Storage news ticker – October 10
blocksandfiles.com·12h
📊Column Stores
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.org·18h
🕸️Graph Databases
Understanding conflict resolution and avoidance in PostgreSQL: a complete guide
pgedge.com·2h·
Discuss: r/programming
💾Databases
A Manifesto for the Programming Desperado
github.com·6h·
Discuss: Hacker News
🧊Iceberg Tables
From CAP to GAP?
fsharpforfunandprofit.com·15h·
Discuss: DEV
🔧Functional Programming
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.com·8h
🛡️Memory Safety
Why Do Data Pipelines Need Streaming — Isn’t Batch Processing Enough?
linkedin.com·17h·
Discuss: DEV
🌊Stream Processing
N8n vs. Windmill vs. Temporal
blog.arcbjorn.com·22h·
Discuss: Hacker News
📊Columnar Engines
From Hours to Minutes: How Dmall Cuts Data Integration Costs to 1/3 with Apache SeaTunnel?
dev.to·13h·
Discuss: DEV
🏛️Lakehouse Architecture
The Day I Hacked XCTrack
blog.syrac.org·7h·
Discuss: Hacker News
🦠Malware Analysis
Zero-day in file-sharing software leads to RCE, and attacks are ongoing
theregister.com·6h
🧊Iceberg Tables
From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 1
cybernews.com·12h·
Discuss: DEV
🗄️Storage Tiering
Microsoft Adds Agentic AI Capabilities to Sentinel
darkreading.com·6h
👁️Observability
Gadget chains in Java: how unsafe deserialization leads to RCE?
dev.to·13h·
Discuss: DEV
🛡️Memory Safety
timelinize/timelinize
github.com·20h
🧊Iceberg Tables
Debugging Humidity: Lessons from deploying software in the physical world
physical-ai.ghost.io·2h·
Discuss: Hacker News
👁️Observability
How to Migrate from Sanity to Strapi: Complete Step-by-Step Guide
dev.to·11h·
Discuss: DEV
DataFusion