Never Too Late: If you missed the IPKat last week!
ipkitten.blogspot.com·1d·
🏺ZIP Archaeology
Backstage Adoption Guide: When to Use Spotify’s Developer-Portal Framework
earthly.dev·3d·
Discuss: r/programming
🦋Format Metamorphosis
Celebrating the partners driving Disrupt’s big ideas, connections, and community
techcrunch.com·1d
🖥️Terminal Renaissance
Kernel 6.17: auspicious autumnal accomplishments
collabora.com·3d·
Discuss: Hacker News
🔍eBPF
How to Build Your Own Programming Language (It’s Easier Than You Think)
hackernoon.com·11h
⚙️Parser Generators
Persona Injection: LLM context management experiment and model's self-analysis
news.ycombinator.com·1d·
Discuss: Hacker News
🤖Grammar Induction
Python Data Science Handbook: Full Text in Jupyter Notebooks
github.com·3d·
Discuss: Hacker News
🧪Data science
PyStackOps: Unified local and cloud DevOps stack for deployment & monitoring
reddit.com·2d·
Discuss: r/kubernetes
📦Container Security
Automated Verification & Enhancement of Scientific Reasoning via HyperScore-Driven Evaluation
dev.to·1d·
Discuss: DEV
Automated Theorem Proving
Automate Marathon Bib Number Recognition with Computer Vision
blog.roboflow.com·9h·
Discuss: Hacker News
🌊Stream Processing
Predictive Analytics for Optimized Aging Research Animal Allocation and Health Trajectory Modeling
dev.to·2d·
Discuss: DEV
📊Feed Optimization
OjaKV: Context-Aware Online Low-Rank KV Cache Compression with Oja's Rule
arxiv.org·5d
🌊Streaming Compression
AISHELL6-whisper: A Chinese Mandarin Audio-visual Whisper Speech Dataset with Speech Recognition Baselines
arxiv.org·4d
🎙️Whisper
SAR-KnowLIP: Towards Multimodal Foundation Models for Remote Sensing
arxiv.org·4d
📸TIFF Archaeology
PostgreSQL 18 New Features
neon.com·2d·
Discuss: Hacker News
🗄️PostgreSQL WAL
Automated Anomaly Detection in MFM Magnetic Domain Wall Dynamics via Hyperdimensional Fourier Analysis
dev.to·2d·
Discuss: DEV
🧲Magnetic Recording
Authentic Discrete Diffusion Model
arxiv.org·2d
🔍Vector Forensics
Linuxiac Weekly Wrap-Up: Week 39 (Sep 22 – 28, 2025)
linuxiac.com·5d
🔓Open Source Software
Invisibility Cloak: Disappearance under Human Pose Estimation via Backdoor Attacks
arxiv.org·1d
🕵️Vector Smuggling
APPLE-SA-09-29-2025-4 macOS Sequoia 15.7.1
seclists.org·3d
🔌Operating system internals