CodeQL zero to hero part 1: The fundamentals of static analysis for vulnerability research
Learn more about static analysis and how to use it for security research!In this blog post series, we will take a closer look at static analysis concepts, present GitHub’s static analysis tool CodeQL, and teach you how to leverage static analysis for security research by writing custom CodeQL queries.
Coreboot and Linux Hardware: Inside Star Labs with Sean Rhodes
Sean Rhodes, Firmware Engineer at Star Labs, shares the journey of building Linux-first laptops and mini PCs backed by open firmware. From the early days as a side project to surviving supply chain crises and choosing coreboot over AMI BIOS, Sean explains what it takes to create reliable hardware for the open source community.
Complex IT complexity costs enterprises millions, draining resources and stifling innovation. A modern, API-driven approach can cut costs and drive agility.
Previously: Models of (Dependent) Type Theory. There is a deep connection between mathematics and programming. Computer programs deal with such mathematical objects as numbers, vectors, monoids, fu…
Cap'n Web: A new RPC system for browsers and web servers
Cap'n Web is a new open source, JavaScript-native RPC protocol for use in browsers and web servers. It provides the expressive power of Cap'n Proto, but with no schemas and no boilerplate.
A Tour of eBPF in the Linux Kernel: Observability, Security and Networking | Blog
eBPF lets you run small, verified programs inside the Linux kernel, enabling fast observability, security, and networking without changing application code. This practical tour explains why eBPF matters now, how programs are compiled, verified, JITed, and attached to events, and how maps and ring buffers move data. You'll leave with simple demos and a clear mental model to start experimenting.
As coding agents mature and developer adoption accelerates, organizations can produce code faster than ever. But with speed and agent-written code comes risk and merge conflicts. To unlock shipping fast – and safely – mitigating these issues is essential. Here's how agent-ready feature flags make this possible.
While working on adding process identification to the network monitoring tool RustNet, I discovered interesting differences in how macOS and Linux tackle a quite common challenge: mapping network packets to processes. Especially tricky seem to be those short-lived processes that traditional polling approaches often miss.
3 Trends Shaping How Devs Build AI Agents - Especially VoiceAI
What happens when AI agents stop just chatting and start acting, collaborating, and transforming business - powered by developers behind the scenes? Magic!
The Right Way to Implement Business Schedules | TimeTime
From simple weekly hours to complex patterns with exceptions, holidays, and seasonal changes - explore how to properly model business availability using modern standards like iCalendar.