Vulnerability Management โ€“ Requirements, Scoping & Target Setting
blog.nviso.euยท3d
๐Ÿ”Capability Systems
Announcing coreboot 25.09 release
blogs.coreboot.orgยท1d
๐Ÿ”ŒOperating system internals
Superpowers 2.0 came out yesterday and might already be obsolete.
blog.fsck.comยท18h
๐ŸชŸAwesome windows command-line
Publishing my bachelor's thesis in applied mathematics
timktitarev.wordpress.comยท2dยท
๐Ÿ“Linear Algebra
Getting a Hypergraph of Functions to a Browser
systeminit.comยท3dยท
Discuss: Hacker News
๐Ÿ“E-graphs
Why it took 4 years to get a lock files specification
snarky.caยท1dยท
๐Ÿ”„Language Evolution
Removing Infill to Make 3D Printed Parts Much Stronger
hackaday.comยท7h
๐Ÿ“„Document Digitization
[Pre-RFC] Substructural Type System
internals.rust-lang.orgยท4hยท
Discuss: Hacker News
๐Ÿ”’Type Safety
Open ASR Leaderboard tests more than 60 speech recognition models for accuracy and speed
the-decoder.comยท10h
๐ŸŽ™๏ธWhisper
The Project That Made Me Choose C Again
hackernoon.comยท3d
๐Ÿ”ฉSystems Programming
Why Your Resume Fails CI/CD: 10 Tools to Debug It for ATS Parsers
dev.toยท2dยท
Discuss: DEV
๐Ÿค–Archive Automation
Automated Anomaly Detection in Account Takeover via Multi-Modal Graph Neural Network Fusion
dev.toยท1dยท
Discuss: DEV
๐Ÿ”Vector Forensics
Fundamental engineering principles can help identify disease biomarkers more quickly
phys.orgยท1d
โš™๏ธsystems theory
Online KubeDiagrams Service
reddit.comยท8hยท
Discuss: r/kubernetes
๐Ÿ“ฆContainer Security
Incense bowl and helmet handle among finds at National Trust estate dig
the-independent.comยท3d
๐ŸบArchaeological Computing
Quantum Agents: The Algorithmic Alchemists Reshaping Discovery
dev.toยท1dยท
Discuss: DEV
โš›๏ธQuantum Algorithms
Krish Naik: Complete RAG Crash Course With Langchain In 2 Hours
dev.toยท10hยท
Discuss: DEV
๐Ÿ“ŠMulti-vector RAG
Africa Wiki Women at Wikimania 2025 Nairobi
diff.wikimedia.orgยท9h
๐Ÿ›Wikidata