Hacker Newsnew | past | comments | ask | show | jobs | submit | northstar702's commentslogin

On September 8, 2025, NPM reported that several libraries were compromised in a user-side man-in-the-middle attack. This research dives into the details about how the attack works.


This is interesting. Do you find this simpler?


Curious which version you tried and what k8s environment did you explore?


Are you referring to redpanda.com or something else?


Data streaming emerged as a new software category. It complements traditional middleware, data warehouse, and data lakes. Apache Kafka became the de facto standard. New players enter the market because of Kafka’s success. One of those is Redpanda, a lightweight Kafka-compatible C++ implementation. This blog post explores the differences between Apache Kafka and Redpanda, when to choose which framework, and how the Kafka ecosystem, licensing, and community adoption impact a proper evaluation.


is your thesis available to read? Jepsen and these concepts for databases are certainly very different from those for kafa, as we heard from Kyle during the Jepsen testing for Redpanda. Someone needs to write about those perceptions!


The blog for a deeper dive into results, fixes, and discussion on the write behavior in the kafka protocol. https://redpanda.com/blog/redpanda-official-jepsen-report-an...


Thank you. Fixed.


what do we define as a game engine vs a graphic engine?


I thought this was really useful in getting a quick overview of a variety of systems in the real world, even though the book itself is designed to answer interview questions. https://www.amazon.com/System-Design-Interview-Insiders-Guid...


Came here to say the same. System Design Interview book has digestible level of info on what the OP is asking (I think :-) )


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: