Enhancing Vector Signal Generator Accuracy with Adaptive Polynomial Regression Calibration
dev.toยท10hยท
Discuss: DEV
๐Ÿ“กAudio Modulation
An enough week
blog.mitrichev.chยท1dยท
๐Ÿ“ˆLinear programming
Erlang-Red Walkthrough โ€“ Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.comยท9hยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
Modern C and initializing an array
subethasoftware.comยท1d
๐Ÿ—‚Data structures
From Static Rate Limiting to Adaptive Traffic Management in Airbnbโ€™s Key-Value Store
medium.comยท1d
๐ŸŒŠStreaming Systems
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.orgยท19h
๐Ÿ“Compression Bounds
APRS over LoRa with RNode | unsigned.io
unsigned.ioยท12h
๐Ÿ“ปHomebrew Protocols
The Why of PGP Authentication
articles.59.caยท10h
๐Ÿ”‘Cryptographic Protocols
Metasploit Wrap Up 10/09/2025
rapid7.comยท1d
๐Ÿ›ก๏ธeBPF Security
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.comยท2d
๐ŸงฌPostgreSQL Forensics
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.orgยท23hยท
Discuss: Hacker News
๐Ÿ”ขReed-Solomon Math
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.comยท2d
๐ŸงชBinary Fuzzing
Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.comยท3d
๐Ÿ”ขReed-Solomon Math
Learning from software errors โ€“ Part 3: A Mars probe gets out of control
heise.deยท15h
๐Ÿ“žSession Types
Jankiest rpi router
mloduchowski.comยท1dยท
Discuss: r/homelab
๐Ÿ”ŒSingle Board PC
XProc 3 Steps as XSpec Test Helper Functions
medium.comยท6h
๐Ÿ”€XSLT
BQN "Macros" with โ€ขDecompose (2023)
saltysylvi.github.ioยท1hยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
The Day I Hacked XCTrack
blog.syrac.orgยท8hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Open Lineage
usenix.orgยท19h
๐Ÿ”ŒInterface Evolution
Sorting encrypted data without decryption: a practical trick
dev.toยท8hยท
Discuss: DEV
๐Ÿ”Hash Functions