One of Utah’s Own
theatlantic.com·6h
📟Terminal Forensics
Automating Distro Updates in CI
paretosecurity.com·16h
🌿git
Why I Switched from Vim to Neovim / LazyVim and How I Did It
nickjanetakis.com·4d
🔄Language Evolution
Antivirus maxing out 8 threads
forums.anandtech.com·5h
🧠Memory Forensics
A Review of Nuclear War: A Scenario by Annie Jacobsen
militaryrealism.blog·4h·
Discuss: Hacker News
🌡️Preservation Physics
Becoming an algorithmic problem: Resistance in the age of predictive technology
transformingsociety.co.uk·11h·
Discuss: Hacker News
🌍Cultural Algorithms
Judge Dismisses Some of WPEngine’s Claims Against WordPress
pxlnv.com·2h
Proof Automation
Don't Build an Audience
humaninvariant.com·5h·
Discuss: Hacker News
📡RSS Readers
Under the Hood of Fuzzy Search: Building a Search Engine 15 times fuzzier than Lucene
andrewjsaid.com·6d·
🎯Automata theory
Behind The Scenes of Bun Install
🔩Systems Programming
Shape-changing tensegrity-blocks enable self-assembling robotic structuress
nature.com·14h·
Discuss: Hacker News
⚙️Tape Transport
Jef Raskin’s cul-de-sac and the quest for the humane computer
arstechnica.com·19h·
🍎Apple Computing
IO is special
blog.ploeh.dk·5d·
Discuss: Lobsters
🧬Functional Programming
Tricks from OpenAI gpt-oss YOU 🫵 can use with transformers
huggingface.co·2d·
🎯Emulator Accuracy
Show HN: LibPolyCall – Zero-Trust Polyglot FFI with Perfect State Reproduction
github.com·3d·
Discuss: Hacker News
🔌Interface Evolution
Generative Quasi-Continuum Modeling of Confined Fluids at the Nanoscale
arxiv.org·2d
🌐Computational Topology
Anchoring Refusal Direction: Mitigating Safety Risks in Tuning via Projection Constraint
arxiv.org·4d
Effect Handlers
ALL-PET: A Low-resource and Low-shot PET Foundation Model in the Projection Domain
arxiv.org·1d
🗜️LZW Variants
Bias in the Loop: How Humans Evaluate AI-Generated Suggestions
arxiv.org·2d
🎯Content Recommendation
Repeating vs. Non-Repeating FRBs: A Deep Learning Approach To Morphological Characterization
arxiv.org·4d
🧠Machine Learning