Researchers claim ChatGPT has a whole host of worrying security flaws - here's what they found
techradar.comยท11h
๐Ÿ”“Hacking
Flag this post
Handling Time and Mock Clocks in Tests
blog.angular.devยท7h
๐ŸŽฏEmulator Accuracy
Flag this post
Introducing the Web Thing Protocol
tola.me.ukยท15hยท
Discuss: Hacker News
๐ŸŒNetwork Protocols
Flag this post
Software design is refinement, not abstraction (2022)
sicpers.infoยท9hยท
Discuss: Hacker News
๐Ÿ’งLiquid Types
Flag this post
Oops, My UUIDs Collided
alexsci.comยท6dยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Flag this post
The Same Feature That Makes a Component Powerful Can Also Make It Dangerous
blog.zast.aiยท2dยท
Discuss: Hacker News
๐Ÿ”’WASM Capabilities
Flag this post
Field notes from making a living without writing a line of code
ag404labs.comยท2dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Flag this post
Optimizing filtered vector queries from tens of seconds to single-digit milliseconds in PostgreSQL
clarvo.aiยท1dยท
Discuss: Hacker News
๐Ÿง Query Planners
Flag this post
Autark: Rethinking build systems โ€“ Integrate, Don't Outsource
blog.annapurna.ccยท2dยท
โš™๏ธBuild Archaeology
Flag this post
Ask HN: My family business runs on a 1993-era text-based-UI (TUI). Anybody else?
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿ’พvintage computing
Flag this post
Eight millennia of continuity of a previously unknown lineage in Argentina
nature.comยท1dยท
Discuss: Hacker News
๐ŸฆดBinary Paleontology
Flag this post
WCH BLE Analyzer Pro โ€“ A Bluetooth LE sniffer, analyzer, and debugging tool
cnx-software.comยท1d
๐Ÿ“กBluetooth Archaeology
Flag this post
Building Custom Components in Langflow ๐Ÿ› ๏ธ
dev.toยท2dยท
Discuss: DEV
๐ŸงฉWASM Components
Flag this post
Assessing Climate Vulnerability Risk for Substations in Massachusetts Via Sensitivity Analysis
arxiv.orgยท3h
๐Ÿฆ€Embedded Rust
Flag this post
Cisco: Partially critical security vulnerabilities in multiple products
heise.deยท22h
๐Ÿ”“Hacking
Flag this post
Is cryptography in Go hard?
reddit.comยท1dยท
Discuss: r/golang
๐Ÿ”Hash Functions
Flag this post
ELA-1568-1 unbound1.9 security update
freexian.comยท13h
๐ŸŒDNS Security
Flag this post
Active Noise Control Method Using Time Domain Neural Networks for Path Decoupling
arxiv.orgยท1d
๐ŸŽผAudio Lambda Calculus
Flag this post
What a diff makes: automating code migration with large language models
arxiv.orgยท3d
๐Ÿ”„Language Evolution
Flag this post
How to Evolve Software for Minimum Disruptions: The Architect's Two Hats
medium.comยท1dยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
Flag this post