Google Looks To Bring JPEG-XL Support Back To Chrome / Chromium
phoronix.comยท44m
๐Ÿ–ผ๏ธJPEG XL
Flag this post
wBlock Is the Best Way to Block Ads on Safari
lifehacker.comยท1d
๐Ÿ—œ๏ธLZW Variants
Flag this post
7-Zip: Attackers Inject Malicious Code
heise.deยท2d
๐Ÿ’ฃZIP Vulnerabilities
Flag this post
How I automate my Substack newsletter with content from my blog
simonwillison.netยท3d
๐Ÿ“ฐRSS Feed Discovery
Flag this post
[D] ICLR double blind reviewing
reddit.comยท20hยท
๐ŸŽ“Academic Torrents
Flag this post
Ten Blue Links, โ€œPop goes the bubbleโ€ edition
ianbetteridge.comยท14h
๐Ÿš€Indie Hacking
Flag this post
Downsampling: Largest-Triangle-Three-Buckets and the Fourier Transform
daniel.mitterdorfer.nameยท1dยท
Discuss: Hacker News
๐ŸŒˆSpectral Compression
Flag this post
Why People Donโ€™t Demand Data Privacy, Even As Governments & Corporations Collect More Personal Info
techdirt.comยท1d
๐ŸงฒMagnetic Philosophy
Flag this post
Nano Banana Pro cast a design spell in NotebookLM to explore the legend of Camelot
techradar.comยท16h
๐Ÿ›Digital humanities
Flag this post
Python Certifi and Custom CAs
zufallsheld.deยท19hยท
Discuss: Hacker News
๐ŸงชCBOR Fuzzing
Flag this post
OSI Layer 4 Security Vulnerabilities & Resolutions
dev.toยท21hยท
Discuss: DEV
๐Ÿ“กNetwork Monitoring
Flag this post
Self-Supervised Compression and Artifact Correction for Streaming Underwater Imaging Sonar
arxiv.orgยท4d
๐Ÿ“ŠRate-Distortion Theory
Flag this post
The Evolving Ethics of Medical Data Stewardship
arxiv.orgยท2d
โš–๏ธArchive Ethics
Flag this post
Enhanced Spintronic Device Modeling via Adaptive Hyperdimensional Representation
dev.toยท21hยท
Discuss: DEV
๐ŸงฒMagnetic Recording
Flag this post
Ask HN: NPM docs re. changes to auth, token management are a mess, what to do?
news.ycombinator.comยท3hยท
Discuss: Hacker News
๐ŸงFOSS
Flag this post
No Key, Mo Problems
bfswa.substack.comยท1dยท
Discuss: Substack
๐Ÿ”—Hash Chains
Flag this post
Management Pseudo-Science
laser-coder.netยท19hยท
Discuss: Hacker News
๐Ÿ“Code Metrics
Flag this post
Introducing VPC encryption controls: Enforce encryption in transit within and across VPCs in a Region
aws.amazon.comยท1d
๐ŸŒณArchive Merkle Trees
Flag this post