Survivorship in the Digital Age (2013)
mrgris.comยท19hยท
Discuss: Hacker News
๐Ÿ›ก๏ธCapability Security
Testing Compression with a Bash Script
gilesorr.comยท3d
๐Ÿ“ฆCompression Algorithms
Beyond Traditional Pseudorandomness, Tsotchkes' Quantum Random Number Generation
medium.comยท4dยท
Discuss: Hacker News
๐Ÿ”—Hash Functions
A Simple Script for New Users: Find Out Why Your App Broke After an Update (Maybe)
reddit.comยท9hยท
Discuss: r/archlinux
๐Ÿ”งError Recovery
Hands-on Demo of Glamorous Toolkit & Moldable Development โ€ข Tudor Girba & Kris Jenkins โ€ข GOTO 2024
youtube.comยท16h
โšกLive Coding
Evolution is dumb and slow, right?
lesswrong.comยท1d
๐Ÿ”ฌNanopasses
Looking for unique IoT & Embedded Systems ideas for graduation project
reddit.comยท6hยท
Discuss: r/embedded
๐Ÿค–Embedded Go
MฤฐGROS TฤฐCARET A.ลž.(MGROS) Finansal Takvim 15 Eylรผl 2025
finans.mynet.comยท2d
๐Ÿlisp
Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack
theregister.comยท23h
๐Ÿท๏ธMemory Tagging
A Cheaper Way to Test Ventilation Rates?
lesswrong.comยท7h
โœจEffect Inference
What Programming Language Is Used for Raspberry Pi? (A Practical, No-Nonsense Guide)
dev.toยท1dยท
Discuss: DEV
๐Ÿค–Embedded Go
DisorientLiDAR: Physical Attacks on LiDAR-based Localization
arxiv.orgยท1d
๐Ÿ”Lens Libraries
SK Hynix DDR5 DIMMs Vulnerable to "Phoenix" Rowhammer Attack, On-Die ECC Exposed Too
techpowerup.comยท1d
๐ŸŽฏRing Buffers
Adaptive Temporal Fusion Transformers for Cryptocurrency Price Prediction
arxiv.orgยท2d
๐Ÿ”ขAlgebraic Datatypes
๐ŸŽฏ The Heart of a Proxmox Cluster: Understanding Corosync for a Stable Homelab
dev.toยท1dยท
Discuss: DEV
๐Ÿ“กErlang BEAM
Maximizing UAV Cellular Connectivity with Reinforcement Learning for BVLoS Path Planning
arxiv.orgยท51m
๐Ÿš‚Error Propagation