Tuta Introduces Key Verification
๐Security Patterns
Flag this post
TapFlow: BJJ Timer and Drills
๐Time Series ML
Flag this post
Under the hood: How Firefox suggests tab groups with local AI
๐ปProgramming languages
Flag this post
Show HN: Bother, my answer to the poor UX of bloated project management tools
๐ปPolars
Flag this post
Scientists develop microscopic, wireless implants covered with living cells (to avoid bodyโs immune system) that are injected into blood vessels, travel to cros...
๐Distributed systems
Flag this post
Protecting Against Open-Source Malicious Packages: What Doesn't Work
๐Security Patterns
Flag this post
Man Pages (Part 1)
๐นApache Arrow
Flag this post
The Twilio-Stytch Acquisition: A Watershed Moment for Developer-First CIAM
๐Security Patterns
Flag this post
Deepnote, a โSuccessor to Jupyter Notebook,โ Goes Open Source
๐ปProgramming languages
Flag this post
Atomically accurate de novo design of antibodies with RFdiffusion
๐๏ธDatabase Internals
Flag this post
Loading...Loading more...