A non-digital service example of working in the open
blog.ldodds.com·1d
🏺Media Archaeology
SnortML: Cisco’s ML-Based Detection Engine Gets Powerful Upgrade
blogs.cisco.com·2d
🌐NetworkProtocols
Nyquist–Shannon Sampling Theorem
en.wikipedia.org·1d·
Discuss: Hacker News
🔊Audio Compression Theory
humanely dealing with humungus crawlers
flak.tedunangst.com·3d·
🐧FOSS
MLPerf Inference v5.1 Results Land with New Benchmarks and Record Participation
hpcwire.com·2d·
Discuss: Hacker News
📊Performance Profiling
C++ Memory Management • Patrice Roy & Kevin Carpenter • GOTO 2025
youtube.com·2d
🔩Systems Programming
Python Mystery Quiz: Can You Crack This Code?
dev.to·3d·
Discuss: DEV
🔗Concatenative Programming
How I Use AI to Build Real Business Models (Not Just Content)
dev.to·2d·
Discuss: DEV
🌀Brotli Internals
Early Feedback on “Build a Reasoning Model (From Scratch)”
dev.to·6d·
Discuss: DEV
🔗Constraint Handling
Day 94: When Pitch Preparation Becomes Self-Discovery
dev.to·10h·
Discuss: DEV
🚀Indie Hacking
Enhanced Transient Plasma Thruster Modeling via Reinforcement Learning and Multi-fidelity Simulations
dev.to·14h·
Discuss: DEV
⚙️Cassette Mechanics
A layered architecture for log analysis in complex IT systems
arxiv.org·2d
👁️Observatory Systems
Technical documentation: what it is, why it breaks, and how to keep it up to date
dev.to·1d·
Discuss: DEV
📚Documentation Archaeology
First Impressions with Amazon Bedrock AgentCore
dev.to·3d·
Discuss: DEV
🏠Homelab Orchestration
Building a Local Documentation Chatbot with Python, FAISS, and OpenAI
dev.to·5d·
Discuss: DEV
🤖Archive Automation
DCP-o-matic • Re: DCP with CPLs with different audio tracks, Verify gives an error.
dcpomatic.com·1d
FLAC Verification
🛡️ Understanding Prompt Injection Attacks in LLMs — with Real Scenarios and Code Examples
dev.to·4d·
Discuss: DEV
🛡️WASM Security
Quantifying REM-NREM Sleep Cycle Coordination via Bayesian Dynamic Networks
dev.to·1d·
Discuss: DEV
🧠Machine Learning