3Avoiding the pitfalls of iteration-based development, in 5 pull requests (opens in new tab)(about.sourcegraph.com)1luord4y ago0
7Conti ransomware goes rogue, leaks “gang data" (opens in new tab)(nakedsecurity.sophos.com)2luord4y ago0
8The difference between software and hardware projects (opens in new tab)(stackoverflow.blog)1luord4y ago0
11Modify HTTP request headers with transform rules (opens in new tab)(blog.cloudflare.com)5luord4y ago0
12How to prevent scope creep when managing a project from home (opens in new tab)(stackoverflow.blog)2luord4y ago0