Google is helping girls “scout” a path to digital wellbeing.
blog.google·1d
🏛Digital humanities
Flag this post
Site Unseen: Enumerating and Attacking Active Directory Sites
synacktiv.com·15h
🏢Active Directory
Flag this post
The wait for new Siri continues
leancrew.com·1d
💾vintage computing
Flag this post
TLA+ Modeling of AWS outage DNS race condition
muratbuffalo.blogspot.com·11h·
⚙️TLA+
Flag this post
LLMs pivot to the aesthetics of thinking
macwright.com·1d
🧩WASM Components
Flag this post
Our Naive "Innovation" Fetish (2014)
newrepublic.com·19h·
Discuss: Hacker News
🧲Magnetic Philosophy
Flag this post
7 Linux commands to keep your system healthy and optimized
howtogeek.com·1d·
Discuss: Hacker News
🛠System administration
Flag this post
Deploying Temporal on AWS ECS with Terraform
papnori.github.io·1d·
Discuss: Hacker News
🤝Consensus Protocols
Flag this post
More Sub-Etha Software MM/1 source code on GitHub
subethasoftware.com·15h
🗃️ROM Preservation
Flag this post
The keyboard of choice for modular synth nerds gets a proper sequel after 10 years
theverge.com·13h
⌨️Mechanical Keyboards
Flag this post
Pillar-cage fluorinated hybrid porous framework features rare quasi-Johnson solid J₂₈ structure
phys.org·15h
Coffee Chemistry
Flag this post
I worked at Baidu, ByteDance, and Microsoft. Now, I've raised millions to build robotic pets.
businessinsider.com·9h
🇨🇳Chinese Computing
Flag this post
Civilization Heartbeat Sentinel
github.com·1d·
Discuss: Hacker News
📡Network Monitoring
Flag this post
Euclid peers through dark cloud LDN 1641's dusty veil
phys.org·13h
🏺Computational Archaeology
Flag this post
Detached agent chains that work like people do
dev.to·11h·
Discuss: DEV
Proof Automation
Flag this post
GrowthHacker: Automated Off-Policy Evaluation Optimization Using Code-Modifying LLM Agents
arxiv.org·2d
Incremental Computation
Flag this post
Telex Weather Agent
dev.to·13h·
Discuss: DEV
🌊Apache Kafka
Flag this post
How to Build an AWS Bedrock Supervisor Agent to Automate EC2 and CloudWatch Tasks
hackernoon.com·3d
🚀Indie Hacking
Flag this post