When Dependencies Turn Dangerous: Responding to the NPM Supply Chain Attack
blog.qualys.comยท3d
๐Ÿ”—Supply Chain
WASM GIF
igorbedesqui.comยท21hยท
Discuss: Hacker News
๐Ÿ”—Concatenative Programming
Auth Migration Hell: Why Your Next Identity Project Might Keep You Up at Night
securityboulevard.comยท2dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Unicode 17.0 Release Announcement
blog.unicode.orgยท4dยท
๐Ÿ”ฃUnicode
How thousands of โ€˜overworked, underpaidโ€™ humans train Googleโ€™s AI to seem smart
theguardian.comยท2dยท
๐Ÿค–AI Curation
Large Language Mode(ration)
ashley.rolfmore.comยท2dยท
Discuss: Hacker News
๐Ÿ—บ๏ธCompetency Maps
Integrating CSS Cascade Layers To An Existing Project
smashingmagazine.comยท3d
๐Ÿฆ‹Format Metamorphosis
Maintaining Arch Linux AUR Packages: Updating python-simple-term-menu to the Latest Release
dev.toยท1dยท
Discuss: DEV
๐ŸŒ€Brotli Internals
Show HN: YC Web Scraper โ€“ Collection of scripts to scrape YC Startup Directory
github.comยท15hยท
Discuss: Hacker News
๐ŸŒWARC Mining
The Assembly Line of AI Productivity
dev.toยท6hยท
Discuss: DEV
๐Ÿ“Code Metrics
An Incredible Lifeform Is Evolving at Lightning Speedโ€”Faster Than We Ever Imagined Possible
popularmechanics.comยท6h
๐ŸŒก๏ธPreservation Physics
ZynorRAT: The New Cross-Platform Malware Controlled via Telegram
securityonline.infoยท19hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
MasconCube: Fast and Accurate Gravity Modeling with an Explicit Representation
arxiv.orgยท2d
๐ŸŒ€Differential Geometry
Automated Microfluidic Flow Calibration via Hybrid Reinforcement Learning and Bayesian Optimization
dev.toยท2dยท
Discuss: DEV
โ˜•Precision Brewing
ProtSAE: Disentangling and Interpreting Protein Language Models via Semantically-Guided Sparse Autoencoders
arxiv.orgยท4d
๐Ÿ”—Monadic Parsing
How to Write Cleaner Code by Thinking Like an Architect
dev.toยท5dยท
Discuss: DEV
โš™๏ธBuild Archaeology
Anchoring Refusal Direction: Mitigating Safety Risks in Tuning via Projection Constraint
arxiv.orgยท4d
โœจEffect Handlers