Morning.dev
My Feed Popular
Login
Hacker News: Front Page • 2026-04-20 16:37

Quantum Computers Are Not a Threat to 128-Bit Symmetric Keys

Article URL: https://words.filippo.io/128-bits/ Comments URL: https://news.ycombinator.com/item?id=47836784 Points: 12 # Comments: 2

0 0
1m read
What’s Next for React in 2026
Telerik Blogs • 2026-04-20 16:37

What’s Next for React in 2026

The State of React survey reveals developer insights into the patterns and tools they use and how their opinions about React are shifting.

0 0
1m read
Hacker News • 2026-04-20 16:35

Show HN: Ctx – a /resume that works across Claude Code and Codex

Comments

0 0
1m read
DEV Community • 2026-04-20 16:34

Anyone working on applications for Recursive Language Models? #discussion #rlm

0 0
1m read
Hacker News: Front Page • 2026-04-20 16:34

We Accepted Surveillance as Default

Article URL: https://vivianvoss.net/blog/why-we-accepted-surveillance Comments URL: https://news.ycombinator.com/item?id=47836730 Points: 12 # Comments: 1

0 0
1m read
Echo JS • 2026-04-20 16:31

WebBlackbox - A flight recorder and time-travel debugger for web apps

Comments

0 0
1m read
DEV Community • 2026-04-20 16:31

Serverless applications on AWS with Lambda using Java 25, API Gateway and DynamoDB - Part 6 Using GraalVM Native Image

Introduction In part 1, we introduced our sample application. In parts 2-5, we measured Lambda function performance using different approaches: without activation of Lambda SnapStart with activation of Lambda SnapStart, but without using any priming techniques with activation of Lambda SnapStart and using different priming techniques We observed that by activating the SnapSart and a...

0 0
7m read
Guía Definitiva de Merge Sort: El Algoritmo de Divide y Vencerás
DEV Community • 2026-04-20 16:26

Guía Definitiva de Merge Sort: El Algoritmo de Divide y Vencerás

Merge Sort es un algoritmo de ordenamiento basado en el paradigma Divide y Vencerás. Divide recursivamente el arreglo en mitades hasta llegar a elementos individuales (ordenados por definición) y luego los mezcla de forma ordenada. Garantiza un rendimiento de O(n log n) en todos los casos. El algoritmo Merge Sort (u Ordenamiento por Mezcla) es uno de los pilares del ordenamiento en ciencias de ...

0 0
4m read
DEV Community • 2026-04-20 16:22

I Built a Social Media App Where Posts Self-Destruct (And Why That's the Future)

I Built a Social Media App Where Posts Self-Destruct (And Why That's the Future) Social media is broken. And not in a "we need better moderation" way — it's broken at the fundamental mechanic level. Every platform operates on the same assumption: content is permanent. You post something. It lives forever. The algorithm decides who sees it. You have no real control. And your feed become...

0 0
6m read
DEV Community • 2026-04-20 16:20

Meta's $2B Bet: The 'Child Safety' Bill That Builds a National ID Layer

analyzing the technical shift toward OS-level biometric verification The technical landscape for developers working in computer vision and biometrics is about to undergo a massive structural shift. For years, age verification and identity checks have been handled at the application layer. Whether you were integrating a third-party KYC provider or building your own age-estimation models using Tens...

0 0
3m read
DEV Community • 2026-04-20 16:20

Axios Compromise: What Actually Happened

Axios 1.3.2 is a supply chain implant, not a software vulnerability. The distinction matters operationally. There is no CVE because no code in the library was defective - an attacker with valid npm credentials published a trojaned release, and it remained live in the registry for approximately 78 hours before a community security researcher flagged the anomalous publish and npm's security team pul...

0 0
4m read
DEV Community • 2026-04-20 16:20

How Attackers Turned Trivy Into a Weapon Against Cisco

Cisco DevHub, ShinyHunters, and the Artifact Store Problem This is not a supply chain attack on Trivy. Trivy's code was not compromised. Its release pipeline was not tampered with. Its distribution chain was not poisoned. The attack class is artifact store misconfiguration - an access control failure in how CI/CD scan output was stored and exposed. No Trivy CVE is confirmed as the attac...

0 0
5m read
DEV Community • 2026-04-20 16:20

How to Prevent Email Leaks When Sharing Collaborative Docs Publicly

So here's a fun one. You share a collaborative document publicly — a wiki page, a project roadmap, internal docs — and every editor's email address is silently exposed to anyone who knows where to look. This isn't hypothetical. It just happened with Notion, where security researchers discovered that public pages leak the email addresses of every editor through the page's underlying API responses....

0 0
6m read
Hacker News: Front Page • 2026-04-20 16:19

Palantir Wants to Reinstate the Draft

Article URL: https://reason.com/2026/04/20/this-big-tech-firm-wants-to-reinstate-the-draft/ Comments URL: https://news.ycombinator.com/item?id=47836463 Points: 26 # Comments: 5

0 0
1m read
DEV Community • 2026-04-20 16:18

greatCircleDistance in ClickHouse: Avoiding Full Table Scans

When working with location data, one problem shows up almost immediately: “How do I calculate the distance between two coordinates stored in my database?” At first, it seems like something you’d have to handle outside the database. But if you're using ClickHouse, there’s a built-in function for this. The Right Tool: greatCircleDistance greatCircleDistance(lat1, lon1, lat2, l...

0 0
2m read
Hacker News • 2026-04-20 16:17

Show HN: Open security key on nrf52480 with NFC

Comments

0 0
1m read
Lobsters • 2026-04-20 16:16

Effectful Recursion Schemes

Comments

0 0
1m read
When Your Coding Assistant Finally Got X-Ray Vision
Telerik Blogs • 2026-04-20 16:14

When Your Coding Assistant Finally Got X-Ray Vision

The Fiddler Everywhere MCP server gives your coding assistant network inspection capabilities for debugging right inside your editor.

0 0
1m read
Enhanced Tagging in Postgres Query Insights
DEV Community • 2026-04-20 16:14

Enhanced Tagging in Postgres Query Insights

By Rafer Hazen As part of our Traffic Control launch, we made enhancements to the Insights query tagging feature for Postgres databases. Insights has supported query tags for some time, but they were previously only attached as metadata on individual notable query logs. With this release, tags are now present in aggregated query data, which enables powerful new capabilities. It's now possible to ...

0 0
9m read
TPU Mythbusting: vendor lock-in
DEV Community • 2026-04-20 16:11

TPU Mythbusting: vendor lock-in

Tensor Processing Units are a technology developed and owned by Google. While you can find GPUs in every cloud provider offer, the TPUs are currently only available through Google Cloud Platform. Situation when you invest in a technology or a service that is not available anywhere else is called vendor lock-in — it's something the sales people love, while customers try to avoid it. What does this ...

0 0
2m read
Previous Next

Showing page 301 of 1441

Previous 301 Next