Military Moral Injury, Violence, and the Parable of the Guinea Worm
nakedcapitalism.comยท7h
๐Cassette Forensics
Flag this post
Podcast Ep. 513 | The Sound of Life
theminimalists.comยท1h
โฌMinimalism
Flag this post
How to rate-limit requests with NGINX
joshtronic.comยท1d
๐DNS over QUIC
Flag this post
The quiet revolution: How regulation is forcing cybersecurity accountability
cyberscoop.comยท3d
๐กCybersecurity
Flag this post
Checkly Adds DNS Monitors
๐DNS Security
Flag this post
Token-Optimized Notation Language
โ
Format Verification
Flag this post
Whatโs the point of a retro case โ???โ
rubenerd.comยท2d
๐น๏ธRetro Gaming
Flag this post
Show HN: Spine AI โ Visual workspace to think across multiple AI models
๐คAdvanced OCR
Flag this post
Google's Gemini Deep Research can now read your Gmail and rummage through Google Drive
๐Digital humanities
Flag this post
Vacancy for Digital Ingest Conservator at Victoria and Albert Museum
dpconline.orgยท3h
๐ผCassette Archaeology
Flag this post
Lessons from the Vibe Coding Trenches
โ๏ธLean Tactics
Flag this post
WD Velociraptor, 80k hours, born Nov 2008, RIP Nov 2025
forums.anandtech.comยท22h
๐ ๏ธGreaseweazle
Flag this post
๐ง Built a VS Code extension that flags misleading function names in Python (early access) - feedback welcome!
๐ขDenotational Semantics
Flag this post
NAS Storage Help
๐ฟDisk Geometry
Flag this post
Predicting & Mitigating Data Corruption in Pure Storage Flash Arrays via Adaptive Bit Error Rate Modeling
๐ก๏ธError Boundaries
Flag this post
Risky Bulletin: US indicts two rogue cybersecurity employees for ransomware attacks
news.risky.bizยท5d
๐กCybersecurity
Flag this post
Loading...Loading more...