High-Quality Video Tape Conversion for Homes and Businesses
forums.anandtech.com·2d
📼Tape Simulation
Product comparison: Detectify vs. Tenable
blog.detectify.com·1d
🎯Threat Hunting
Unboxing Newton Press – Apple’s Text Authoring Software for the Newton (research.reisen)
research.reisen·2d
🖥️Vintage Macintosh
Show HN: Velocity is a post-quantum transport protocol
projectvelocity.org·1d·
Discuss: Hacker News
🌐DNS over QUIC
LineageOS 23
lineageos.org·6h·
🔓Open Source Software
Reverse Supply Chain Network Design of a Polyurethane Waste Upcycling System
arxiv.org·2d
🔗Supply Chain
Learning from software errors – Part 3: A Mars probe gets out of control
heise.de·1d
📞Session Types
The People Rescuing Forgotten Knowledge Trapped On Old Floppy Disks
it.slashdot.org·1d
💽Floppy disks
Show HN: Twoway, a Go package for HPKE encrypted request-response flows
github.com·3d·
🔑Cryptographic Protocols
The B2B Sales Funnel as a State Machine: An Engineer's Guide to Revenue Growth
dev.to·19h·
Discuss: DEV
🦋Format Metamorphosis
Code Green: How Big Data and AI are Engineering a Sustainable Planet
dev.to·20h·
Discuss: DEV
🌊Stream Processing
Building Self-Correcting Database Agents with Meta's Llama-4-Scout: From Natural Language to SQL Insights
dev.to·2d·
Discuss: DEV
🗄️Database Internals
Memgoose – An In-Memory Mongoose Impersonator
github.com·20h·
Discuss: Hacker News
🔄Sync Engine
Krish Naik: Complete RAG Crash Course With Langchain In 2 Hours
dev.to·16h·
Discuss: DEV
📊Multi-vector RAG
Accelerated Cold Tolerance Breeding via Multi-Modal Phenotyping and Genome-Wide Predictive Modeling
dev.to·9h·
Discuss: DEV
Precision Brewing
Detecting Semantic Clones of Unseen Functionality
arxiv.org·5d
🔗Binary Similarity
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.com·1d·
Discuss: Hacker News
🎫Kerberos Exploitation
An enough week
blog.mitrichev.ch·2d·
📈Linear programming
Nov 15 2025 : Intro to Soldering Workshop: Make an LED Tile
nycresistor.com·1d
⚙️DIY Electronics
Automated Anomaly Detection in Account Takeover via Multi-Modal Graph Neural Network Fusion
dev.to·1d·
Discuss: DEV
🔍Vector Forensics