Taking a Look at Compression Algorithms
cefboud.com·1d·
📦Deflate
Protecting data from the public and ourselves
statmodeling.stat.columbia.edu·6h
⚖️Lossy Compression Ethics
Achieving TB-Level Aggregate Bandwidth: How JuiceFS Optimized Distributed Cache Network
dev.to·15h·
Discuss: DEV
📡Network Stack
rpki-client 9.6 released
bsdsec.net·1d
🏺ZIP Archaeology
Launching Our Free Filename Tool
filenametool.com·5h·
Discuss: Hacker News
🗜️ZIP Forensics
AT Protocol private data: Developing a rubric for success
pfrazee.leaflet.pub·20m·
Discuss: Hacker News
🏠Homelab Federation
Towards Size-invariant Salient Object Detection: A Generic Evaluation and Optimization Approach
arxiv.org·21h
📊Learned Metrics
What's a UUID, and what do you use that for?
bitecode.dev·9h
🔐CBOR
Writing Our Own Structure: Tries in Haskell & Rust
mmhaskell.com·17h
🌳Trie Structures
Am I missing the boat on vector databases for RAG?
littleleaps.substack.com·1d·
Discuss: Substack
🗂️Vector Databases
SpamSieve 3.2
tidbits.com·6h
🍎Apple Archive
Directory Listings with Foundry
blogs.gnome.org·1d
Bidirectional Programming
Media Player Classic BE is a modern take on a classic player
techspot.com·7h
🎥Streaming Codecs
Record labels claim AI generator Suno illegally ripped their songs from YouTube
theverge.com·11h
🏴‍☠️Piracy
Merkle Trees in SQLite with Python: A Practical Tutorial
dev.to·4h·
Discuss: DEV
🌳Archive Merkle Trees
Artificial Intelligence in Networking Research in the Arab World
cacm.acm.org·7h
🕸️Mesh Networking
How Gifshuffle Works
darkside.com.au·2h·
Discuss: Hacker News
🕵️Steganographic Compression
Security review of PHP documentation
blog.quarkslab.com·1d
🛡️WASM Security
Tips for Working with Legacy Code
esveo.com·11h·
🌿git
Creating a database of motivated proofs
gowers.wordpress.com·3h·
Discuss: Hacker News
🎯Performance Proofs