Whistleblower says US watered down report on Shireen Abu Akleh’s killing
aljazeera.com·2h
📡RSS
Flag this post
Boom Brief #4: How you tackled our challenge to brand a spine-chilling rollercoaster
creativeboom.com·9h
👥UX Research
Flag this post
Books That Kill: The Poison Book Project
theinternetsaysitstrue.com·11h
🔬Maillard Reaction
Flag this post
Art is vulnerable. Anything can be art.
vee.bearblog.dev·21h
🎨NYC Museum Scene
Flag this post
The memos behind Altman's ousting
therundown.ai·6h
🤖AI
Flag this post
MongoDB Announces Leadership Transition
🐯TigerBeetle
Flag this post
React-Native-Godot
🚀Modal
Flag this post
Show HN: I built an SEO tool that uses embeddings to analyze content relevance
📊Search Ranking
Flag this post
Looking for Untranslated Non-Fiction From Across Europe
zylstra.org·1h
🌏BGE Embeddings
Flag this post
An AI slop farm stole my identity
🚀Indie Hacking
Flag this post
Making a C64/C65 compatible computer: MEGAphone contact list and Dialer
🪄Prompt Engineering
Flag this post
Philippe Kahn
deprogrammaticaipsum.com·13h
🔓Open Source Software
Flag this post
Weekly Update 476
troyhunt.com·8h
🔓Hacking
Flag this post
Physicist discusses the Higgs boson and whether it might change the fate of the universe
phys.org·31m
⚛️Physics
Flag this post
Inside OAuth 2.0: The Four Roles Powering Every ‘Sign in with Google
pub.towardsai.net·16h
🚀Indie Hacking
Flag this post
Practical Design Patterns for Agentic Systems
pub.towardsai.net·10h
🪄Prompt Engineering
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
🕳LLM Vulnerabilities
Flag this post
<span class="nop nop-start">1/ </span> For those who don’t know me, here’s a bit of my story.
threadreaderapp.com·3h
🚀Indie Hacking
Flag this post
Loading...Loading more...