Alexander Fehrmann: How To Analyze Impression Evidence In Amped FIVE
forensicfocus.com·2h
🔍Binary Forensics
Embedding Lua in Nim
lambdacreate.com·3d
🦀Rust Macros
nginx/docker-nginx
github.com·15h
📦Git LFS
Should You Use Upper Bound Version Constraints?
iscinumpy.dev·1d·
🔗Dependency Resolution
Superbase on the Commodore 64
stonetools.ghost.io·3d·
Discuss: Hacker News
🕹️Retro Gaming
Old-school functional and design specification reviews
smalldatum.blogspot.com·1d·
Discuss: Hacker News
📏Code Metrics
You can just open source things
cased.com·1d·
Discuss: Hacker News
🔓Open Source Software
A new database solution for trading off between rigid schemas and no schema mess
scopedb.io·6d·
Discuss: Hacker News
🏺Database Archaeology
Replit's Existential Problem
blog.charliemeyer.co·3h·
Discuss: Hacker News
🚀Indie Hacking
Daily briefing: Chemistry Nobel for ‘super sponge’ MOFs
nature.com·6h
🌡️Preservation Physics
🚀 Day 38 of My Data Journey
dev.to·22h·
Discuss: DEV
🕸️Neo4j
Tech With Tim: Python Web Scraping: A Million Dollar Project Idea - FULL Build/Tutorial
dev.to·3h·
Discuss: DEV
🔍BitFunnel
Unified Unsupervised Anomaly Detection via Matching Cost Filtering
arxiv.org·2d
🌸Bloom Variants
Adaptive Predictive Maintenance of PLC-Controlled Conveyor Systems via Multi-Modal Data Fusion and Anomaly Scoring
dev.to·18h·
Discuss: DEV
🌊Stream Processing
The Custom Portal Design: Building Your Own Context Managers
dev.to·14h·
Discuss: DEV
📝Concrete Syntax
Open Agent Specification (Agent Spec): A Unified Representation for AI Agents
github.com·1d·
Discuss: Hacker News
🔒WASM Capabilities