Fluent Visitors: revisiting a classic design pattern
neilmadden.blog·5h
λLambda Formalization
Flag this post
Home lab Network Upgrade Time
jimmielightner.com·2d
📊Homelab Monitoring
Flag this post
PAINT25 Invited Talk transcript: “Notational Freedom via Self-Raising Diagrams”
programmingmadecomplicated.wordpress.com·14h
📝Concrete Syntax
Flag this post
I tried Elon Musk's Starlink internet on a Royal Caribbean cruise ship
royalcaribbeanblog.com·1d·
Discuss: Hacker News
🏴‍☠️Piracy
Flag this post
A leadership vacuum and staff cuts threaten NSA morale, operational strength
nextgov.com·10h·
Discuss: Hacker News
🛡Cybersecurity
Flag this post
Lazy loading isn't the magic pill to fix AI Inference
tensorfuse-docs.mintlify.dev·12h·
Discuss: Hacker News
🌊Stream Processing
Flag this post
Europe's Decentralized Messaging Survives "Chat Control" Threat
process-one.net·20h·
Discuss: Hacker News
🏺Protocol Archaeology
Flag this post
Musk's XChat is Safe as "Bitcoin-style" peer-to-peer encryption?
pbxscience.com·1d·
Discuss: Hacker News
🌊Stream Ciphers
Flag this post
We need to give LLMs human-like vision
matml.bearblog.dev·10h·
💻Local LLMs
Flag this post
Writing an LLM from scratch, part 27 – what's left, and what's next?
gilesthomas.com·1d·
Discuss: Hacker News
💻Local LLMs
Flag this post
We discovered over 2k vulns and PII in apps built with vibe coding platforms
escape.tech·6d·
Discuss: Hacker News
🏺ZIP Archaeology
Flag this post
Digital Warfare and the New Geopolitical Frontline
heimdalsecurity.com·9h
🇸🇪Swedish Cryptanalysis
Flag this post
Beyond Bandwidth: AI's Quantum Leap in Image Transmission
dev.to·16h·
Discuss: DEV
🧠Neural Compression
Flag this post
OpenAI API moonlights as malware HQ in Microsoft’s latest discovery
theregister.com·14h
🔓Hacking
Flag this post
PotlatchDeltic Corporation (PCH) Q3 2025 Earnings Call Transcript
seekingalpha.com·6h
🌊CBOR Streaming
Flag this post
NDC Conferences: Lessons Learned Building the Ultimate AI Bug Reporter - Adam Cogan - NDC Copenhagen 2025
dev.to·2h·
Discuss: DEV
🎙️Whisper
Flag this post
Automated Verification of Terrestrial Ecosystem Resilience via Hyperdimensional Network Analysis
dev.to·2d·
Discuss: DEV
🕸️Algebraic Topology
Flag this post
How Unified Communication Platforms Are Transforming Business Connectivity
dev.to·1d·
Discuss: DEV
🔌Interface Evolution
Flag this post
Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset
arxiv.org·22h
🔐Homomorphic Encryption
Flag this post