InclusiveColors: WCAG accessible color palette creator for Tailwind/CSS/Figma/Adobe
inclusivecolors.com·1d
🎨Design Systems
Flag this post
Trezor Safe 3/5/7 (hardware cold wallets)
discuss.privacyguides.net·1d
🔐Hardware Security
Flag this post
🔗 Font with built-in syntax highlighting
yellowduck.be·1d
🔨Incremental Compilation
Flag this post
EP188: Servers You Should Know in Modern Systems
blog.bytebytego.com·1d
🌐Network Security
Flag this post
New global research shows eye movements reveal how native languages shape reading
theconversation.com·15h
🗃️Zettelkasten
Flag this post
Move Your Sprites! - October 2025 Devlog
violethorizons.itch.io·1h
🎨Creative Coding
Flag this post
On Reed–Solomon Proximity Gaps Conjectures
eprint.iacr.org·4d
🔢Homomorphic Encryption
Flag this post
My experience with various Linux distros
reddit.com·17h·
Discuss: r/linux
🐧Linux
Flag this post
Dissecting the syscall Instruction: Kernel Entry and Exit Mechanisms.
reddit.com·22h·
Discuss: r/programming
📞System Calls
Flag this post
The Road Ahead: Why I'm Going All-In on Zig
pmbanugo.me·1d·
Discuss: Hacker News
⚙️Zig
Flag this post
Pool allocator in C++23 for simulations / game engines - faster than std::pmr
github.com·3d·
Discuss: r/programming
💾Memory Allocators
Flag this post
A Deep Dive into the Morris Worm
rapid7.com·4d·
Discuss: Hacker News
🔓Binary Exploitation
Flag this post
OpenTelemetry vs Prometheus: Choosing the Right Observability Approach
nobl9.com·19h·
Discuss: DEV
🔭Tracing
Flag this post
Building Your Own Virtual Private Cloud on Linux: A Deep Dive into Network Namespaces
dev.to·13h·
Discuss: DEV
🐝Cilium
Flag this post
Base64 Encoder — Wrap Your Data in a Cozy Little Blanket 🕵️‍♂️🧣
dev.to·2d·
Discuss: DEV
📦Binary Formats
Flag this post
Time for the System Source Swap Meet pics I took... in no particular order. Let's goooo! 🧵 time.
threadreaderapp.com·1d
💾Retro Computing
Flag this post
How To Use DeepSeek-OCR And Docling For PDF Parsing
dev.to·3h·
Discuss: DEV
📚Technical Writing
Flag this post
Announcing SlopGuard — Open-Source Defence Against AI Supply Chain Attacks
dev.to·2d·
Discuss: DEV
🛡️AI Security
Flag this post
Sub-exponential Growth in Online Word Usage: A Piecewise Power-Law Model
arxiv.org·3d
📊Data Science
Flag this post