Integrating Clusters
optional.isΒ·3h
πŸ‡ΈπŸ‡ͺNordic Algorithms
More adventures in the land of AI and Open Source
blogs.gnome.orgΒ·3d
πŸ¦€Rust Macros
HackerOne Introduces the New Hacker Milestone Rewards Program
hackerone.comΒ·2d
πŸš€Indie Hacking
Dual Threat: Threat Actors Combine Credential Phishing and Malware
cofense.comΒ·2d
🎯NTLM Attacks
3D Modeling with Paper
arvinpoddar.comΒ·1hΒ·
Discuss: Hacker News
πŸ“Projective Geometry
Freshdesk Integration with Jira. Step-by-Step Guide
getint.ioΒ·6hΒ·
Discuss: Hacker News
🌊Streaming Systems
An Inline Cache Isn't Just a Cache
mgaudet.caΒ·1dΒ·
Discuss: Hacker News
πŸ—οΈCompiler Archaeology
Practical CI-friendly Performance Tests
solidean.comΒ·3dΒ·
Discuss: Lobsters, r/cpp
⚑Performance Mythology
Reciprocate, a Sweet Solution for Making HTML Web Components Reactive
thathtml.blogΒ·3dΒ·
Discuss: Hacker News
🎯Gradual Typing
Urlref: Website Bookmarking for Handwritten Notes
benjaminhollon.comΒ·1dΒ·
Discuss: Hacker News
πŸ“Concrete Syntax
What Can We Actually Do With corner-shape?
css-tricks.comΒ·1h
πŸ“Geometric Hashing
3 Ways Security Teams Can Tame Autonomous AI Agents
thenewstack.ioΒ·20h
πŸ”Capability Systems
Python Mystery Quiz: Can You Crack This Code?
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”—Concatenative Programming
Jaguar Land Rover backtracks, says hackers may have taken some data
techradar.comΒ·1d
πŸ”“Hacking
Built-in Runtime Security for Containers
blog.qualys.comΒ·3d
πŸ“¦Container Security
Personalized Sleep Prediction via Deep Adaptive Spatiotemporal Modeling and Sparse Data
arxiv.orgΒ·11h
πŸŽ™οΈWhisper
Salty2FA Takes Phishing Kits to Enterprise Level
darkreading.comΒ·2d
πŸ”“Hacking
Co-Investigator AI: The Rise of Agentic AI for Smarter, Trustworthy AML Compliance Narratives
arxiv.orgΒ·1d
πŸ”Vector Forensics
Adaptive Artifact Rejection in ΞΌ-EEG Decoding via Self-Normalizing Hyperdimensional Vectors
dev.toΒ·7hΒ·
Discuss: DEV
πŸ‘οΈPerceptual Coding