WordPress Spam Users
etbe.coker.com.au·1d
📰RSS Reading Practices
TDM exceptions (not just the three-step test) don’t allow all unlicensed AI development
ipkitten.blogspot.com·1d·
⚖️Emulation Ethics
The gospel according to Peter Thiel: why the tech svengali is obsessed with the antichrist
theguardian.com·1h
🧲Magnetic Philosophy
Installing SearXNG on AlmaLinux/RHEL/Rocky Linux with Podman and SELinux
neelc.org·1d
📻Homebrew Protocols
The cost of design iteration in software engineering
ayende.com·1d
⚙️Proof Engineering
“A Google for DNA”: Scientists Launch Groundbreaking Search Engine for Genetic Code
scitechdaily.com·1d
🔄Burrows-Wheeler
Founder Blood and Ambition
sabih.dev·1h·
Discuss: Hacker News
👪Geneology
Earning the Right to Be Illegible
joshbeckman.org·1d·
Discuss: Hacker News
⚙️Proof Engineering
Functional guarantees for semantic awareness on graphs
researchgate.net·1d·
Discuss: Hacker News
🧮Kolmogorov Complexity
Why did Meta Superintelligence Lab publish an obscure paper?
tornikeo.com·1d·
Discuss: Hacker News
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
The Absolute Minimum Every Developer Must Know About Unicode and Character Sets
joelonsoftware.com·6d·
Discuss: Hacker News
🔤Character Encoding
Introducing: Local Browser AI
blog.alexewerlof.com·1d·
Discuss: Hacker News
🎙️Whisper
HN: Symbiotic-Governance-Framework
github.com·1h·
Discuss: Hacker News
🤝Consensus Networks
Why Self-Host?
romanzipp.com·5d·
Discuss: Hacker News
🏠Personal Archives
Managing Asynchronous Work with Celery and Redis
dev.to·4d·
Discuss: DEV
🌊Apache Kafka
Prompt Injection 2.0: The New Frontier of AI Attacks
dev.to·2d·
Discuss: DEV
🎯Threat Hunting
What do you think about this setup ?
reddit.com·2d·
Discuss: r/homelab
💾Proxmox Storage
The Anatomy of a Modern Ranking Architectures: Part 4
shaped.ai·1d
📊Search Ranking
After 6 months of learning Go, I built LocalDrop - my first real project (file sharing over LAN)
reddit.com·1d·
Discuss: r/golang
📻Homebrew Protocols
Google, Mandiant expose malware and zero-day behind Oracle EBS extortion
securityaffairs.com·1d
🎫Kerberos Attacks