Navigating the evolving cybersecurity landscape: Key insights for the public sector
cloud.google.com·8h
🌐Network Protocols
N8n vs. Windmill vs. Temporal
blog.arcbjorn.com·1d·
Discuss: Hacker News
🎰Bytecode VMs
Programming in the Sun: A Year with the Daylight Computer
wickstrom.tech·1d·
💾vintage computing
Using a Laptop as an HDMI Monitor for an SBC
danielmangum.com·1d·
Discuss: Hacker News
💾vintage computing
Functions are Asymmetric
elbeno.com·1h
🧩programming
Daily briefing: Chronic pain linked to small cluster of brain cells
nature.com·13h
📡RSS
Serverless ICYMI Q3 2025
aws.amazon.com·1d
🎰Bytecode VMs
The Liquid Glass Plan
netnewswire.blog·2d
💾vintage computing
Notes on running postmarketOS on a OnePlus 6
neilzone.co.uk·2d·
Discuss: Hacker News
🎰Bytecode VMs
Life Inside China’s Gig Machine
jacobin.com·11h
🎰Bytecode VMs
Multi-Core By Default
rfleury.com·22h·
🧩programming
If data is the new ammo, Army may need dedicated data formations: General
breakingdefense.com·3h
🔱plan 9
Can You Recommend a Good Bookmark Manager?
kottke.org·9h
📡RSS
How to Save the World with ZFS and 12 USB Sticks: 4th Anniversary Video (2011)
constantin.glez.de·2h·
Discuss: Hacker News
📡RSS
A Cornucopia of Cuisine: Food options at the 2025 Arkansas State Fair
kark.com·23h
📡RSS
The CV-1000 returns, but at what cost?
nicole.express·21h
💾vintage computing
MicroPythonOS: an Android-like operating system for microcontrollers like the ESP32
osnews.com·2d
🎰Bytecode VMs
ESP32 and Termux
blog.gavide.dev·1d·
Discuss: Hacker News
🎰Bytecode VMs
EasyOS – An experimental Linux distribution (2025)
easyos.org·6d·
🎰Bytecode VMs
Evolution of Apple Security Bounty Program
mjtsai.com·2h
💾vintage computing