Pirate IPTV Empire Goes Dark in Brazil, Marketing the Common Denominator
torrentfreak.comยท2d
๐Ÿดโ€โ˜ ๏ธPiracy
Flag this post
Out-of-Print Archive
outofprintarchive.comยท1d
๐ŸบGaming Archaeology
Flag this post
The R47: A new physical RPN calculator released today in 2025
swissmicros.comยท3hยท
Discuss: Hacker News
โŒจ๏ธMechanical Keyboards
Flag this post
Show HN: Find matching acrylic paints for any HEX color
acrylicmatch.comยท3dยท
Discuss: Hacker News
๐ŸŒˆColor Archaeology
Flag this post
From a Curious Outsider to a GreptimeDB Advocator Journey into Contribution
greptime.comยท2dยท
Discuss: Hacker News
๐ŸงฌBitstream Evolution
Flag this post
Can-t stop till you get enough
cant.bearblog.devยท4dยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
Flag this post
Shazam for iOS just got a Liquid Glass makeover
engadget.comยท1d
๐Ÿ’ฟFLAC Archaeology
Flag this post
Real-time stock volatility prediction with deep learning on a time-series DB
medium.comยท3dยท
Discuss: Hacker News
๐ŸŒŠStreaming Databases
Flag this post
AI Is Supercharging the War on Libraries, Education, and Human Knowledge
404media.coยท19h
๐Ÿ“šMARC Archaeology
Flag this post
Scraping TikTok Profiles and Videos with Python (Part 1)
dev.toยท1dยท
Discuss: DEV
๐Ÿ•ธ๏ธWebP Analysis
Flag this post
NumPy for Absolute Beginners: A Project-Based Approach to Data Analysis
towardsdatascience.comยท2d
๐ŸŒŠDigital Signal Processing
Flag this post
Towards Aligning Multimodal LLMs with Human Experts: A Focus on Parent-Child Interaction
arxiv.orgยท6h
๐ŸงฎKolmogorov Complexity
Flag this post
HOOW: The High-Yield Illusion Behind Roundhill's Weekly Leverage Machine
seekingalpha.comยท9m
๐Ÿ“ฐFeed Readers
Flag this post
FLoC: Facility Location-Based Efficient Visual Token Compression for Long Video Understanding
arxiv.orgยท3d
โšกLZ4 Streaming
Flag this post
InfoSec News Nuggets 11/04/2025
aboutdfir.comยท2d
๐Ÿ”“Hacking
Flag this post
Disciplined Biconvex Programming
arxiv.orgยท3d
๐ŸŽฏPerformance Proofs
Flag this post
Going Beyond Expert Performance via Deep Implicit Imitation Reinforcement Learning
arxiv.orgยท1d
๐Ÿ“ŠLearned Metrics
Flag this post
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.comยท1d
๐ŸŽซKerberos Exploitation
Flag this post
Pro-Russian Hackers Use Linux VMs to Hide in Windows
darkreading.comยท2d
๐Ÿ”“Hacking
Flag this post