Computer vision AI VTI’s against Phishing
vmray.com·15h
👁️Perceptual Hashing
Best Prime Day HDD deals 2025 - hard drives from Seagate, Toshiba, WD from as low as $10/TB
techradar.com·1d
💿Disk Geometry
What is a Capability?
apievangelist.com·1d
🔐Capability Systems
Working for a Vendor with David Gee
blog.ipspace.net·1d
🧲RISC-V Archaeology
Quoting Simon Højberg
simonwillison.net·3h
🦀Rust Macros
Should You Use Upper Bound Version Constraints?
iscinumpy.dev·21h·
🔗Dependency Resolution
Building Actual Peer-to-peer Applications: Outside Misconceptions
hackernoon.com·17h
🌐Distributed Hash
Glasses are the future, but that future is bleak
bhardwajrish.blogspot.com·1d·
Discuss: Hacker News
🌈Holographic Storage
I’ve gone rouge, I think it’s good but I could be crazy
reddit.com·1d·
Discuss: r/homelab
💿FLAC Archaeology
The Cult of Can't – You Just Can't Assume Anything Will Work
aurelien2022.substack.com·11h·
Discuss: Substack
⚖️Emulation Ethics
Stop treating code like an afterthought: record, share and value it
nature.com·1d·
🔓Open Source Software
DeepAf: One-Shot Spatiospectral Auto-Focus Model for Digital Pathology
arxiv.org·17h
🤖Advanced OCR
My Cognitive Dissonance
studium.dev·7h·
Discuss: Hacker News
🚀Indie Hacking
Three Solutions to Nondeterminism in AI
blog.hellas.ai·8h·
Discuss: Hacker News
🎯Performance Proofs
Fire destroys S. Korean government's cloud storage system, no backups available
dev.to·2d·
Discuss: DEV
💾Persistence Strategies
How Platforms (and You) Know If an Image/Video Is AI-Made
michaelgathara.org·1d·
Discuss: Hacker News
🛡️Archive Invariants
Why Your Password Storage is Fine, But Your File Checksum is Obsolete
dev.to·17h·
Discuss: DEV
Checksum Validation
Access Control Policy Generation from High-Level Natural Language Requirements
dl.acm.org·41m·
Discuss: Hacker News
🔒Language-based security
What's new in Python 3.14
docs.python.org·23h·
🌳Incremental Parsing
Duct Tape DSLs: Model Routing, Structured Outputs, and Typed Tools
lowlevelmagic.io·1d·
Discuss: Hacker News
🧩WASM Components