Identify insecure TLS services with the enhanced runZero Certificate Inventory
runzero.com·3h
🔒Security
Flag this post
Explaining the Accessible Benefits of Using Semantic HTML Elements
css-tricks.com·21m
HTMX
Flag this post
Tuesday 18 November 2025
informatics.ed.ac.uk·3h
🔢NumPy
Flag this post
Chris Travers: NUMA, Linux, and PostgreSQL before libnuma Support
stormatics.tech·1d
🏗️NUMA
Flag this post
ChatGPT Pulse is my favorite product of the year....
manton.org·19h
📊Performance Tools
Flag this post
Creating a Linux Application Using VSCodium, Cline, OpenRouter, and Claude
taosecurity.blogspot.com·2d·
🐧Linux
Flag this post
PAINT25 Invited Talk transcript: “Notational Freedom via Self-Raising Diagrams”
programmingmadecomplicated.wordpress.com·2d
🔤Language Design
Flag this post
Session Messenger prepares to weaken file encryption
discuss.privacyguides.net·1d
🔐ChaCha20
Flag this post
Master Python Web Scraping with 5 Real-World Projects
github.com·1d·
Discuss: DEV
🐍Python
Flag this post
Fluent Visitors: revisiting a classic design pattern
neilmadden.blog·1d·
Discuss: r/programming
λFunctional Programming
Flag this post
Minimalistic CLAUDE.md for new projects: Follow SOLID, DRY, YAGNI, KISS
reddit.com·1d·
Discuss: r/ClaudeAI
🔨Incremental Compilation
Flag this post
Lessons from Implementing RAG in 2025
truestate.io·1d·
Discuss: Hacker News
🔍RAG
Flag this post
Production-Ready Rate Limiter in Go: From Side Project to Distributed System
dev.to·3d·
Discuss: DEV
💎Redis
Flag this post
🧠 Soft Architecture (Part B): Emotional Timers and the Code of Care (Part 5 of the SaijinOS series)
dev.to·2h·
Discuss: DEV
💬Prompt Engineering
Flag this post
📚Enterprise Design Patterns: Table Module with Python Example
dev.to·22h·
Discuss: DEV
🎨API Design
Flag this post
Influence of Data Dimensionality Reduction Methods on the Effectiveness of Quantum Machine Learning Models
arxiv.org·11h
⚛️Quantum Computing
Flag this post
Statistical Properties of Rectified Flow
arxiv.org·11h
📊Information Theory
Flag this post
We Tested 6 AI Models on 3 Advanced Security Exploits: The Results
dev.to·4h·
Discuss: DEV
🛡️AI Security
Flag this post
Hypergraph Embedding Optimization for Graph Database Query Acceleration via Differential Evolution
dev.to·1d·
Discuss: DEV
🕸️Graph Databases
Flag this post