VMScape: Exploiting Incomplete Branch Predictor Isolation in Cloud Environments
comsec.ethz.ch·12h·
🏞️Delta Lake
From SQL to Python: Uniting Stored Power with Functional Flexibility
dev.to·2h·
Discuss: DEV
💾Databases
Orange Crabs in the Machine: How Rust is rewriting the rules of modern software
geekwire.com·1h
🦀Rust Scientific
Domain-Driven Design with TypeScript Decorators and Reflection
auslake.vercel.app·22h·
Discuss: r/programming
📊Data Lineage
GPUs as Collateral – Chip Based Asset-Backed Securities
medium.com·19h·
Discuss: Hacker News
🧊Iceberg Tables
StringTape: Apache Arrow-compatible space-efficient "tape" class in pure Rust
github.com·22h·
Discuss: Hacker News
🦀Rust Scientific
C# Will Become F# – Gautier Talks About Microsoft Technology
gautiertalksmicrosoft.wordpress.com·20h·
Discuss: Hacker News
⚙️Query Compilers
Fuzz and Invariant Testing: A Security Researcher's Guide to Uncovering Hidden Vulnerabilities
dev.to·23h·
Discuss: DEV
📋Tokei
Learning
reddit.com·22h·
Discuss: r/golang
🔧Functional Programming
OpenSSF Experts Weigh in on CISA’s SBOM Minimum Elements Update
thenewstack.io·54m
📋Tokei
9 Best Practices for API Security ⚔️
newsletter.systemdesign.one·7h
🦠Malware Analysis
Claude's Memory Architecture Is the Polar Opposite of ChatGPT's
shloked.com·21h·
🧊Iceberg Tables
This Week in Security: NPM, Kerbroasting, and The Rest of the Story
hackaday.com·2h
🦠Malware Analysis
Decompiling the GPL violated Linux kernel using Evolutionary Algorithms
far.chickenkiller.com·8h·
Discuss: Hacker News
⚙️Query Compilers
Upcoming changes for bcachefs; notes for users distributions
lore.kernel.org·5h·
🦀Rust Scientific
MetaRAG: Metamorphic Testing for Hallucination Detection in RAG Systems
arxiv.org·12h
DataFusion
Accelerated Game of Life with CUDA / Triton
boristhebrave.com·20h·
Discuss: Hacker News
📊Columnar Engines
Show HN: DbSandboxer – Fast Isolated Postgres DBs for Spring Boot Tests
github.com·22h·
Discuss: Hacker News
💾Databases
Death to Type Classes
jappie.me·5h·
Discuss: Hacker News
🔧Functional Programming
Recon2012: Reverse engineering of binary programs for custom virtual machines
recon.cx·9h·
Discuss: Hacker News
🦠Malware Analysis