Backstage Adoption Guide: When to Use Spotify’s Developer-Portal Framework
earthly.dev·3d·
Discuss: r/programming
🦋Format Metamorphosis
Celebrating the partners driving Disrupt’s big ideas, connections, and community
techcrunch.com·1d
🖥️Terminal Renaissance
The Photo Map Tile Pareto Front
lnar.dev·3d·
Discuss: Hacker News
📸PNG Optimization
Kernel 6.17: auspicious autumnal accomplishments
collabora.com·3d·
Discuss: Hacker News
🔍eBPF
Easiest way to run LLMs locally
sitepoint.com·3d·
Discuss: Hacker News
💻Local LLMs
Arm MTE and Speculative Oracles
reflexive.space·1d·
Discuss: Hacker News
🏷️Memory Tagging
Persona Injection: LLM context management experiment and model's self-analysis
news.ycombinator.com·1d·
Discuss: Hacker News
🤖Grammar Induction
Python Data Science Handbook: Full Text in Jupyter Notebooks
github.com·3d·
Discuss: Hacker News
🧪Data science
I tested NotebookLM and found it very useful for academic, technical, and general research
techradar.com·1d
🤖Archive Automation
PyStackOps: Unified local and cloud DevOps stack for deployment & monitoring
reddit.com·2d·
Discuss: r/kubernetes
📦Container Security
A Beginner's Guide to Big Data Analytics with Apache Spark and PySpark
dev.to·1d·
Discuss: DEV
🌊Apache Kafka
OjaKV: Context-Aware Online Low-Rank KV Cache Compression with Oja's Rule
arxiv.org·5d
🌊Streaming Compression
AISHELL6-whisper: A Chinese Mandarin Audio-visual Whisper Speech Dataset with Speech Recognition Baselines
arxiv.org·4d
🎙️Whisper
SAR-KnowLIP: Towards Multimodal Foundation Models for Remote Sensing
arxiv.org·4d
📸TIFF Archaeology
PostgreSQL 18 New Features
neon.com·2d·
Discuss: Hacker News
🗄️PostgreSQL WAL
Adaptive Kernel Fusion for Robust Object Detection in Adverse Weather Conditions
dev.to·1d·
Discuss: DEV
🧠Machine Learning
Automated Anomaly Detection in MFM Magnetic Domain Wall Dynamics via Hyperdimensional Fourier Analysis
dev.to·2d·
Discuss: DEV
🧲Magnetic Recording
Authentic Discrete Diffusion Model
arxiv.org·2d
🔍Vector Forensics
Linuxiac Weekly Wrap-Up: Week 39 (Sep 22 – 28, 2025)
linuxiac.com·5d
🔓Open Source Software
Invisibility Cloak: Disappearance under Human Pose Estimation via Backdoor Attacks
arxiv.org·1d
🕵️Vector Smuggling