Ashton Wiersdorf On Organizing Papers For Research
irreal.org·6h
📄PDF Internals
An Anechoic Chamber at Nokia Bell Labs Reveals the Hidden Sounds of Your Body
scientificamerican.com·1d
📡Frequency Archaeology
What could go wrong when MySQL strict SQL mode is off?
synacktiv.com·2d
🧪Binary Fuzzing
Oracle investigating extortion emails targeting E-Business Suite customers
cybersecuritydive.com·1d
🔓Hacking
What we’ve been up to: CloudViPER
openpreservation.org·4d
🏠Homelab Preservation
Why Cinapse Moved Away from CRDTs for Sync
powersync.com·1d·
Discuss: Hacker News
🔀CRDT
LLM Code Review vs. Deterministic SAST Security Tools
blog.fraim.dev·2d·
Discuss: Hacker News
Proof Automation
How to Get Notified on SSH Logins on Linux
linuxiac.com·54m
🛡️CLI Security
Implementing a Kalman Filter in PostgreSQL to Smooth GPS Data
hackaday.com·1d
📏Range Queries
The Architecture of Civilizational Dysfunction
medium.com·14h·
Discuss: Hacker News
⚙️systems theory
How to choose an age verification VPN
techradar.com·2d
🧅Tor Networks
Wine 10.16 Brings Fast NTSync Support
linuxiac.com·5h
🔌Operating system internals
Title: A Step-by-Step Guide to Installing Python: From Download to Fun Projects
dev.to·20h·
Discuss: DEV
🪟Awesome windows command-line
My 2025 Summer Retrospective: A Guide to AI-Powered, Cloud-Native Java with Quarkus
dev.to·1d·
Discuss: DEV
🌊Streaming Systems
From Beginner to Backend Developer: My Almost 1-Year Journey
dev.to·1d·
Discuss: DEV
🚀Indie Hacking
Density-Ratio Weighted Behavioral Cloning: Learning Control Policies from Corrupted Datasets
arxiv.org·1d
🧠Machine Learning
CLUE: Non-parametric Verification from Experience via Hidden-State Clustering
arxiv.org·1d
🧠Machine Learning
A Beginner’s Guide to the Authenticated Byzantine Gossip Protocol
hackernoon.com·2d
🤝Consensus Algorithms
Building a multiplayer TriviaSnake game with Amazon Q Developer!
dev.to·1d·
Discuss: DEV
🔌Interface Evolution
Preparing for a quantum-safe future should begin today
techradar.com·4d
🔐Quantum Security