Using Palm Jumeirah's Design to Visualize the Elliptic Curve Method
codingpirate.com·2h·
Discuss: Hacker News
📐Mathematical Art
QSFP Versus QSFP-DD Here Are the Key Differences
servethehome.com·10h
🔌Interface Evolution
Building My Smart 2nd Brain, Part 3: API and UI Explained
dev.to·14h·
Discuss: DEV
🔄Archival Workflows
News for September 2025
ptreview.sublinear.info·1d
🧪Property-Based Testing
The Spartan Secret: Encrypt Messages with the Scytale Cipher
fcsuper.blogspot.com·11h·
🗝️Paleocryptography
Property-based testing of batch-invariant operations
mmaaz.ca·2h·
Discuss: Hacker News
🧪Property-Based Testing
Sharing is Caring: Arbitrary Code Execution for Breakfast
trebledj.me·3d
🔧Binary Parsers
Plugin Secure
rya.nc·1d·
Discuss: Hacker News
Checksum Validation
An alternative to knowledge graphs for storing loosely structured content
fleetingswallow.com·11h·
Discuss: Hacker News
🕸️Knowledge Graphs
Dimensional Analysis in Programming Languages (2018)
gmpreussner.com·6h·
Discuss: Hacker News
🧮Algebraic Datatypes
DanielSant0s/AthenaEnv
github.com·1d
📺VT100 Emulation
On This Day in Math - October 5
pballew.blogspot.com·20h·
📜Manuscript Algebras
Fun with HyperLogLog and SIMD
vaktibabat.github.io·1d·
📊HyperLogLog
The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.ai·10h·
Discuss: Hacker News
🔐PKI Archaeology
Hacking Claude Code for Fun and Profit
sibylline.dev·11h·
🤖Network Automation
Domain Driven Design in Clojure with Generalized Hiccup
biotz.io·2d·
🔗Functional Compilers
A grand week
blog.mitrichev.ch·12h·
🧮SMT Solvers
Hiding in Plain Sight: Steganography, C2, and SVG Files
infosecwriteups.com·18h
🕵️Steganographic Compression
MathArena Apex: Unconquered Final-Answer Problems
matharena.ai·20h·
Discuss: Hacker News
🧮SMT Solvers
Generalizing the central dogma as a cross-hierarchical principle of biology
royalsocietypublishing.org·15h·
Discuss: Hacker News
🔲Cellular Automata