CDT in NLP Distinguished Lecture Series: Dan Roth
informatics.ed.ac.ukยท1d
๐ญCultural Informatics
Flag this post
Vibe coding security checklist to prevent breaches
fingerprint.comยท3d
๐Hacking
Flag this post
Tp-Link Router Deep Research
r0keb.github.ioยท15h
โกCircuit Archaeology
Flag this post
GitHub Actions in Your JetBrains IDE
๐PREMIS Events
Flag this post
AWS re:Invent 2025: Your guide to security sessions across four transformative themes
aws.amazon.comยท1d
๐ฏThreat Hunting
Flag this post
AI Gateway from Pydantic
โกHomebrew CPUs
Flag this post
Ts-event-core: TypeScript functional programming Event Sourcing implementation
๐Streaming Systems
Flag this post
Show HN: 1Pwned
๐ฏNTLM Attacks
Flag this post
Self Hostable and Open Source Multi-Location Uptime Monitoring
๐ฅ๏ธSelf-hosted Infrastructure
Flag this post
Zig GUI from Scratch
๐ฉSystems Programming
Flag this post
Ask HN: Architecting audit-grade ESG platforms โ AI assistants vs. human CTOs
๐๏ธSystem Observability
Flag this post
Automated Digital Provenance Verification using Blockchain-Integrated Semantic Analysis
๐Data Provenance
Flag this post
Rust Is Memory Safe, but Logic Bugs Still Occur - SPARK Ada Can Help
๐ฆRust Verification
Flag this post
I can't recommend Grafana anymore
๐Apache Kafka
Flag this post
Loading...Loading more...