Astrophysics Source Code Library
ascl.netยท3hยท
Discuss: Hacker News
๐Ÿ•ณ๏ธPersistent Homology
Should you opt-in to Swift 6.2's Main Actor isolation?
donnywals.comยท1dยท
Discuss: Hacker News
โœจEffect Handlers
What Is a Modular Monolith And Why You Should Care? ๐Ÿ”ฅ
thetshaped.devยท2dยท
Discuss: r/programming
๐ŸงฑImmutable Infrastructure
Hnfm: Building a local-first AI podcast generator for Hacker News
briancaffey.github.ioยท2dยท
Discuss: Hacker News
๐Ÿ“กRSS Automation
Why Todays Identity and Access Management Can't Survive the AI Age
identityfusion.comยท1dยท
Discuss: Hacker News
๐Ÿ’พPersistence Strategies
Image-GS: Content-Adaptive Image Representation via 2D Gaussians
github.comยท20hยท
Discuss: Hacker News
๐Ÿ“ธPNG Optimization
001 - This is OnglX deploy
dev.toยท2dยท
Discuss: DEV
๐Ÿ”“Open Source Software
StringTape: Apache Arrow-compatible space-efficient "tape" class in pure Rust
github.comยท20hยท
Discuss: Hacker News
๐Ÿฆ€Rust Verification
Windows Initial Compromise Detection
infosecwriteups.comยท9h
๐Ÿ›ก๏ธeBPF Security
Why Linux has a scattered file system: a deep dive
reddit.comยท3dยท
Discuss: r/linux
๐Ÿ—„๏ธFile Systems
Automated Knowledge Graph Construction & Reasoning for Biomedical Literature Mining
dev.toยท10hยท
Discuss: DEV
๐Ÿ”—Constraint Handling
Cracking Forensics CTFs 1.0 โ€” picoCTF
infosecwriteups.comยท8h
๐Ÿ”Binary Forensics
Smarter Tuning: LLMs Automate Hyperparameter Magic
dev.toยท6hยท
Discuss: DEV
๐Ÿ’ปLocal LLMs
This macOS malware was laying dormant for years, but may have been silently infecting thousands of devices
techradar.comยท1d
๐Ÿฆ Malware Analysis
Hyprland 0.51 Released with Reworked Gestures, New Options
linuxiac.comยท1d
๐Ÿ”ŒOperating system internals
Home Servers with dynamic IPv6 prefix, and external DNS entries.
reddit.comยท11hยท
Discuss: r/homelab
๐ŸŒDNS over QUIC
Why sandboxing matters now โ€” and how to choose one that gives you facts, not fiction
vmray.comยท2d
๐Ÿ”’WASM Capabilities
A Tale from Database Performance at Scale: Rust and Driver Debugging
hackernoon.comยท21h
๐Ÿฆ€Rusty Databases
How DevOps tools are opening the gates for high-profile cyberattacks
techradar.comยท7h
๐Ÿ”“Hacking
Best Secret Scanning Tools for 2025: What Every Developer Needs to Know
dev.toยท8hยท
Discuss: DEV
๐Ÿ”Archive Cryptanalysis