Using Palm Jumeirah's Design to Visualize the Elliptic Curve Method
codingpirate.com·2d·
Discuss: Hacker News
🔢Algebraic Datatypes
Show HN: Timelinize – Privately organize your own data from everywhere, locally
timelinize.com·11h·
Discuss: Hacker News
↔️Bidirectional Sync
Building a Reliable NAS and Integrating UPS Monitoring with TrueNAS and Home Assistant
community.home-assistant.io·19h·
Discuss: DEV
🌍HTTP Servers
Show HN: Blueprintor for Hardware Engineering
zima.run·14h·
Discuss: Hacker News
🌐Portable Assembly
Threat Intelligence Report: Daejeon NIRS Data Center Fire Potential DPRK APT Nexus
krypt3ia.wordpress.com·11h
🔐Security Types
🚀 I built Beat The Boss, an HTML game, with Vibe Coding — give it a spin!
beatthebossgame.com·1d·
Discuss: DEV
Live Coding
Blossom – Heroku-like deploys on your servers; cheaper, no lock-in
blossom88.com·1d·
Discuss: Hacker News
🚂Cranelift IR
Nonlocality-enabled photonic analogies of parallel spaces, wormholes and multiple realities
nature.com·1d
🔍Lens Libraries
How We Found Our Stars
hackernoon.com·1d
🌱Minimal ML
Fast Generic Hash-Table Update
reddit.com·8h·
📋Row Typing
Thinking About Social Media
kevquirk.com·1d
🏠indieweb
Podcast Rewind: Understanding MCP, Computer Coasters, and an Interview with Andrew Fyfe
macstories.net·10h
🏠indieweb
Weekly: Questions and advice
reddit.com·17h·
Discuss: r/kubernetes
🌱Forth Kernels
Explainable but Vulnerable: Adversarial Attacks on XAI Explanation in Cybersecurity Applications
arxiv.org·23h
🛡️Security Type Systems
Bending The Curve
thezvi.substack.com·8h·
Discuss: Substack
🎭Program Synthesis
Batch Processing with Spring Batch and Multiple Data Sources
dev.to·1d·
Discuss: DEV
🔧Error Recovery
The Anti-Corruption Layer: Your Application's Bouncer Against Legacy Chaos
dev.to·23h·
Discuss: DEV
🔐Capability Calculus
Why Enterprise AI Needs Agentic Messaging Platforms
dev.to·1d·
Discuss: DEV
🎭Program Synthesis
Finite Time Analysis of Constrained Natural Critic-Actor Algorithm with Improved Sample Complexity
arxiv.org·23h
🎭Erlang OTP