The Dunhuang Culture 敦煌文化 Database
digitalorientalist.com·1d
📜Text Collation
‘How Did Somebody Make This?’
pxlnv.com·17h
🏺Media Archaeology
How we built a structured Streamlit Application Framework in Snowflake
about.gitlab.com·1d
🌊Streaming Systems
SonicWall investigation shows hackers gained wide access to customer backup files
cybersecuritydive.com·1d
🔍NTLM Forensics
Streamlining Vulnerability Research with the idalib Rust Bindings for IDA 9.2
hex-rays.com·4d
🦀Rust Macros
My first homelab project!
i.redd.it·1d·
Discuss: r/homelab
🏠Homelab
A Manifesto for the Programming Desperado
github.com·1d·
Discuss: Hacker News
💻Programming languages
SSH Security: Why You Should Touch to Verify
ubicloud.com·1d·
Discuss: Hacker News
🔒Hardware Attestation
LINQ and Learning to Be Declarative
nickstambaugh.dev·2d·
Discuss: Hacker News
🔗Concatenative Programming
Show HN: Prompts to make AI impersonate 10 programming legends
ai-impersonator.blueprintlab.io·8h·
🎙️Whisper
Automated Copyright Infringement Detection via Semantic Fingerprinting and Dynamic Thresholding
dev.to·2d·
Discuss: DEV
👁️Perceptual Hashing
From Documents to Dialogue: A step-by-step RAG Journey
dev.to·1d·
Discuss: DEV
📊Multi-vector RAG
CLI tool that translates plain English into Linux commands
reddit.com·1d·
Discuss: r/linux
📝Shell Parsing
Parameterized Complexity of s-Club Cluster Edge Deletion
arxiv.org·2d
🧮Kolmogorov Complexity
Why it took 4 years to get a lock files specification
snarky.ca·13h·
🔄Language Evolution
🐼 Pandas DataFrame Selection, Filtering & Cleaning — Hands-on Practice.
dev.to·22h·
Discuss: DEV
📐Linear Algebra
Faking a Rational Design Process in the AI Era: Why Documentation Matters
albertsikkema.com·1d·
Discuss: Hacker News
⚙️Proof Engineering
Gleam Programming Language Tour
tour.gleam.run·8h·
Discuss: Hacker News
🦀Rust Macros
How JPEG Works: The Subtle Beauty and Art of Imperfection
techspot.com·2d
🖼️JPEG XL
1k LEDs Is No Limit
xayax.net·2d·
Homebrew CPUs