Links
AddIn this post, we'll demonstrate querying the Amazon Redshift audit data logged in S3 to provide answers to common use cases described preceding.
Open map of the world's electricity, telecoms, oil, and gas infrastructure, using data from OpenStreetMap.
Explore Boundary product documentation, tutorials, and examples.
HPKE (RFC 9180) was made to be simple, reusable, and future-proof by building upon knowledge from prior PKE schemes and software implementations. It is already in use in a large assortment of emerging Internet standards and has a large assortment of interoperable implementations. This article provides an overview of this new standard, going back to discuss its motivation, design goals, and development process.
D2 Studio is a diagramming tool uniquely crafted for software architecture
Global Claude Code commands and workflows. Contribute to badlogic/claude-commands development by creating an account on GitHub.
16colo.rs is an archive of ANSI and ASCII art. Preserving artpacks released through the BBS underground artscene since the early 1990s until the present.
macOS and Linux VMs on Apple Silicon to use in CI and other automations - cirruslabs/tart
The Profiles feature takes a step towards fruition
Level up your Obsidian game with Dataview
Researchers at the University of New South Wales have made a world-first research breakthrough demonstrating quantum entanglement between two atoms, a crucial underpinning for scaling quantum computers. Entanglement between at least two qubits is the phenomena that enables information to be encoded on a quantum computer and the information to be processed. This was demonstrated by the UNSW-led team between two electrons on separate phosphorus atoms.The phosphorus atoms were implanted on a silicon chip similar to those in the computers and electronics of today, potentially enabling future manufacturing scale up using existing chip fabrication techniques.
There's a million ways to connect to your home lab, but some options are better for your needs.
The federally funded organization behind the Common Vulnerabilities and Exposures (CVE) program confirmed that its contract to support the system will expire on April 16th.