Building a Privacy-First Log Analyzer for Banking QA: The Technical Architecture
dev.to·5d·
Discuss: DEV
🏞️Delta Lake
Flag this post
Low-Level Hacks
blog.raycursive.com·3d·
Discuss: Hacker News
🦀Rust Scientific
Flag this post
How my Node.js code was causing a massive memory leak and how I solved it
reddit.com·6d·
Discuss: r/programming
🔍Memory Profilers
Flag this post
A Deep Dive into the Morris Worm
rapid7.com·1d·
Discuss: Hacker News
🛡️Memory Safety
Flag this post
The APM paradox
👁️Observability
Flag this post
HTTP desync attacks: request smuggling reborn
portswigger.net·6d·
Discuss: Hacker News
🏞️Delta Lake
Flag this post
Designing Data-Intensive Applications [Book Review]-The Big Ideas Behind Reliable, Scalable and Maintainable Systems
dev.to·1d·
Discuss: DEV
🔧Data Engineering
Flag this post
The Write Last, Read First Rule
tigerbeetle.com·1d·
Discuss: Hacker News
🏞️Delta Lake
Flag this post
Attacking macOS XPC Helpers: Protocol Reverse Engineering and Interface Analysis
tonygo.tech·5d·
🛡️Memory Safety
Flag this post
A security model for systemd
lwn.net·1d·
Discuss: Hacker News
🛡️Memory Safety
Flag this post
Keeping Linux Responsive - Taming the OOM Killer with EarlyOOM
dev.to·5d·
Discuss: DEV
🔍Memory Profilers
Flag this post
MoM: Mixtures of Scenario-Aware Document Memories for Retrieval-AugmentedGeneration Systems
paperium.net·4h·
Discuss: DEV
🏺Data Archaeology
Flag this post
Reflections on Trusting Trust (1984)
web.archive.org·4d·
Discuss: Hacker News
🛡️Memory Safety
Flag this post
Inside Pinecone: Slab Architecture
pinecone.io·2d·
Discuss: Hacker News
🧮Apache Calcite
Flag this post
2 Billion Email Addresses Were Exposed, and We Indexed Them All in Have I Been Pwned
troyhunt.com·2d·
Discuss: Hacker News
🧊Iceberg Tables
Flag this post
SAS Controllers and Flashy Lights (2021)
draeath.net·3d·
Discuss: Hacker News
🗜️Data Compaction
Flag this post
I Used Claude Code to Debug a Nightmare
blendingbits.io·5d·
Discuss: Hacker News
🔬Code Analysis
Flag this post
Complete Guide to MySQL Backup: mysqldump Syntax, Advanced Tips & Restoration Practice
devresourcehub.com·1d·
Discuss: DEV
⚙️Database Internals
Flag this post
Strengthening Active Directory Security Through Continuous Monitoring and Rapid Recovery
cayosoft.com·4d·
Discuss: DEV
🏞️Delta Lake
Flag this post
Frozen in Place
economics.bmo.com·3d·
Discuss: Hacker News
📡RSS
Flag this post