Throw-ins and corners could be next areas of game to face time limits
the-independent.com·1d
Format Verification
Don’t Get Rekt: The NFT Security Handbook That Could Save Your Digital Fortune
blog.checkpoint.com·19h
🎫Kerberos Attacks
New Ubiquiti NAS lineup is here to stay
blog.ui.com·1d·
Discuss: Hacker News
🏠Homelab Preservation
Notes on writing a monovocalic sonnet
muppetlabs.com·2d·
Discuss: Hacker News
🔗Concatenative Languages
QA/Dev Report: August 2025
qa.blog.documentfoundation.org·3d·
Discuss: r/linux
📄PostScript
Obsidian Note Codes
ezhik.jp·1d·
Discuss: Hacker News
🔧KAITAI
Digest #180: Prometheus Scaling, npm Supply Chain Attack, Securing GitHub Actions and Windows Apps on Linux
devopsbulletin.com·17h
❄️Nix Adoption
Breaking free from rising observability costs with open cost-efficient architectures
clickhouse.com·2d·
Discuss: Hacker News
👁️System Observability
Compiling with Continuations
swatson555.github.io·3d·
Discuss: Hacker News
💻Programming languages
From Legacy to GitOps: A Roadmap for Enterprise Modernization
devops.com·21h
🔌Interface Evolution
Secure and Efficient Out-of-band Call Metadata Transmission
arxiv.org·3d
🌐NetworkProtocols
Reasoning Efficiently Through Adaptive Chain-of-Thought Compression: A Self-Optimizing Framework
arxiv.org·2d
🏗️Compiler Archaeology
libicns v0.8.1 Heap Buffer Overflow in libicns ICNS Parsing (icns2png)
seclists.org·4d
Format Verification
Claude-code.nvim: Seamless integration between Claude Code and Neovim
github.com·3d·
Discuss: Hacker News
🪟Awesome windows command-line
I put together 16,223 Free n8n Workflows for Everyone to Use
dev.to·6h·
Discuss: DEV
🌀Brotli Internals
A Domain Knowledge Informed Approach for Anomaly Detection of Electric Vehicle Interior Sounds
arxiv.org·2d
🎵Audio ML
AI Coding - Best Practices in 2025
dev.to·1d·
Discuss: DEV
Proof Automation
Language Models Wrestle with Gaps in Understanding
cacm.acm.org·1d
💻Local LLMs
Deep Temporal Graph Networks for Real-Time Correction of GNSS Jamming-Induced Deviations
arxiv.org·2d
🌈Spectral Methods