Securing the Electric Power Sector through Wireless Threat Detection
bastille.net·6h
📡Network Monitoring
Show HN: Image-to-Dot-to-Dot Generator. Print Custom Puzzles
connectthedotsprintable.online·1d·
Discuss: Hacker News
Bidirectional Programming
Superwall uses WarpStream and ClickHouse to scale subscription monetization
warpstream.com·17h·
Discuss: Hacker News
🌊Streaming Systems
Pixnapping attack lets malicious apps steal sensitive data from Android devices
techspot.com·21m
🦠Parasitic Storage
JIT: So you want to be faster than an interpreter on modern CPUs
pinaraf.info·2d·
🧮Compute Optimization
I built physical album cards with NFC tags to teach my son music discovery
fulghum.io·3d·
Discuss: Hacker News
📼Audio Cassettes
timelinize/timelinize
github.com·4d
⏱️Interval Archives
The Alien Artifact: DSPy and the Cargo Cult of LLM Optimization
data-monger.com·3d·
Discuss: Hacker News
🔍Vector Forensics
Simplifying OpenTelemetry pipelines in Kubernetes
fatihkoc.net·1d·
👁️Observatory Systems
Researchers warn of widespread RDP attacks by 100K-node botnet
securityaffairs.com·1h
🎫Kerberos Attacks
🧩 The Future of Web3 Is Composable, and It’s Powered by Haveto
dev.to·7h·
Discuss: DEV
🖥️Self-hosted Infrastructure
How I Built a Mini C Compiler to Understand How Compilers Work
github.com·23h·
Discuss: DEV
📝Compiler Design
Custom STM32 Boards From Scratch! | The Complete Guide
hackster.io·2d
🎮Switch Archaeology
Tech With Tim: Why 1M People Tried This AI Coding Tool (Full Vibe Coding Tutorial)
dev.to·2d·
Discuss: DEV
🌀Brotli Internals
Tech With Tim: My top 5 python programming course recommendations
dev.to·8h·
Discuss: DEV
🪟Awesome windows command-line
BLINK-Twice: You see, but do you observe? A Reasoning Benchmark on Visual Perception
arxiv.org·1d
📊Learned Metrics
Tech With Tim: Why 1M People Tried This AI Coding Tool (Full Vibe Coding Tutorial)
dev.to·1d·
Discuss: DEV
🚀Indie Hacking