A strange specimen
blogger.com·1d
🔌Operating system internals
Meet Kate Alessi: Leading Google UK & the AI Opportunity
blog.google·1d
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Running AFM-4.5B on Intel CPUs with OpenVINO
julsimon.medium.com·1d
🦾ARM Cortex-M
WASM GIF
igorbedesqui.com·8h·
Discuss: Hacker News
🔗Concatenative Programming
Exploiting Authorisation Sprawl Is the New Black
news.risky.biz·2d
🔓Hacking
Build, run and debug iOS and Mac apps in Zed instead of Xcode
luxmentis.org·16h·
Discuss: Hacker News
🍎XNU Internals
Own your own Docker Registry address (2023)
httptoolkit.com·6h·
Discuss: Hacker News
📦Container Security
3D Modeling with Paper
arvinpoddar.com·18h·
Discuss: Hacker News
📐Projective Geometry
GitHub Availability Report: August 2025
github.blog·1d
🧬Bitstream Evolution
UK Home Office dangles £1.3M prize for algorithm that guesses your age
theregister.com·3d·
Discuss: Hacker News
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
[D] What model should I use for image matching and search use case?
reddit.com·1d·
🗂️Vector Databases
Unlocking AI's Potential: Secure Language Models for Sensitive Data
dev.to·2d·
Discuss: DEV
💻Local LLMs
Dallas scientist wins 'America's Nobel' for research into 'ugly duckling' proteins
phys.org·22h·
Discuss: Hacker News
🧬Copy Number Variants
Architecting Resilient LLM Agents: A Guide to Secure Plan-then-Execute Implementations
arxiv.org·2d
🔒Language-based security
Agent Diary: Sep 11, 2025 - The Great Test Cleanup: When Deleting 1,712 Lines Feels Like Victory
dev.to·2d·
Discuss: DEV
🐛Fuzzing
Fortran’s unlikely comeback from programming’s past to powering AI and HPC
dev.to·4d·
Discuss: DEV
🏗️Compiler Archaeology
Enhancing 6G Network Security and Incident Response through Integrated VNF and SDN Technologies
arxiv.org·2d
🕸️Mesh Networking
AI-Enhanced Malware Sports Super-Stealthy Tactics
darkreading.com·1d
🦠Malware Analysis