Exagen's Momentum Meets Execution Risks: Why I Choose To HOLD For Now
seekingalpha.comΒ·9h
πŸ”—Data Provenance
Life on Mars
caseyhandmer.wordpress.comΒ·30m
🦴Binary Paleontology
Integrating Clusters
optional.isΒ·1d
πŸ‡ΈπŸ‡ͺNordic Algorithms
Hackers Weaponize QR Codes to Lure Mobile Users into Malicious Links
zimperium.comΒ·1d
πŸ“±QR Archaeology
Security News This Week: Jeffrey Epstein’s Yahoo Inbox Revealed
wired.comΒ·11h
πŸ›‘Cybersecurity
Maintenance
nature.comΒ·1d
πŸ€–Tape Automation
Show HN: WebP to PNG converter that runs in the browser
webptopng.devΒ·13hΒ·
Discuss: Hacker News
πŸ•ΈοΈWebP Analysis
Stricter social media algorithms for children: green light in California
heise.deΒ·48m
πŸŽ›οΈFeed Filtering
Adding OR logic forced us to confront why users preferred raw SQL
signoz.ioΒ·3dΒ·
Discuss: Hacker News
⛏️SQL Archaeology
Automating Firmware Security: CI for DBX and Microcode Updates in Dasharo
blog.3mdeb.comΒ·4dΒ·
Discuss: Hacker News
πŸ”’Secure Boot
AI-Personalized Welcome Messages for Website Visitors
peteallport.substack.comΒ·3dΒ·
Discuss: Substack
πŸ”—Hypermedia APIs
AngularJS with Jessica Janiuk
softwareengineeringdaily.comΒ·2d
πŸ”©Systems Programming
Preventing the NPM Debug/Chalk Compromise in 200 lines of JavaScript
getvouchsafe.orgΒ·2dΒ·
πŸ“¦Package Managers
Microsoft drops .NET 10 RC 'go-live' with 55,000 words on why it's faster
theregister.comΒ·2d
🌐WASI
Can You Spend Crypto Without Selling It? Inside The ether.fi Cash Card’s β€œNever Sell” Revolution
hackernoon.comΒ·2d
πŸš€Indie Hacking
Unlocking AI's Potential: Differentiable Planning for Smarter Voice Agents
dev.toΒ·6hΒ·
Discuss: DEV
πŸŽ™οΈWhisper
The AI Echo Chamber: Preventing Voice Assistants From Learning the Wrong Lessons by Pannalabs.ai
dev.toΒ·6hΒ·
Discuss: DEV
πŸ€–AI Curation
Build, Run, Chat: Creating a Self-Hosted LLM Setup
dev.toΒ·3dΒ·
Discuss: DEV
🏠HomeLab
Automated Vulnerability Prioritization via Semantic Similarity & Code Attribution Graph Analysis
dev.toΒ·4dΒ·
Discuss: DEV
πŸ“Code Metrics