Charles Sanders Peirce, George Spencer Brown, and Me โ€ข 19
inquiryintoinquiry.comยท2d
๐Ÿ”คType Theory
Sock Puppets in Osint: How to Build and Use Research Accounts
kalilinuxtutorials.comยท2dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Raspberry Pi Synthesizers โ€“ How the Pi is transforming synths
gearnews.comยท5hยท
Discuss: Hacker News
๐Ÿ”ŒSingle Board PC
โ€˜Fireballโ€™ gives munro-baggers chance to collect meteorite fragments for first time in 100 years
the-independent.comยท1d
๐Ÿ“ฐRSS Archaeology
How the retail sector teams up to defend against cybercrime
cybersecuritydive.comยท1d
๐ŸŽฏThreat Hunting
Google Chrome Just Got More Mac-Friendly with Extensible Single Sign-On Support
jamf.comยท1d
๐Ÿ”ŒOperating system internals
MLPerf Inference v5.1 Results Land with New Benchmarks and Record Participation
hpcwire.comยท1dยท
Discuss: Hacker News
๐Ÿ“ŠPerformance Profiling
A GitHub Co-Founder's Next Commit
opensourcepledge.comยท2dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
When Dependencies Turn Dangerous: Responding to the NPM Supply Chain Attack
blog.qualys.comยท2d
๐Ÿ”—Supply Chain
Scalable LLM approach to enhancing chatbot knowledge with user-generated content
careersatdoordash.comยท5hยท
Discuss: Hacker News
๐ŸŽ™๏ธWhisper
RAG-Powered Chat: OpenAI & ChromaDB Integration
dev.toยท2dยท
Discuss: DEV
๐Ÿ”ŒArchive APIs
Nurix Therapeutics, Inc. (NRIX) Presents At Baird Global Healthcare Conference 2025 (Transcript)
seekingalpha.comยท19h
๐Ÿ”Reverse Engineering
New Homo naledi evidence supports intentional burial practices
phys.orgยท2d
๐Ÿ—๏ธPaleocryptography
Automated Artifact Mitigation in High-Resolution ECG via Adaptive Spectral Filtering and Deep Learning
dev.toยท12hยท
Discuss: DEV
๐ŸŒŠDigital Signal Processing
Automated Analysis of X-ray Scattering Anomalies using Bayesian Neural Networks for Material Characterization
dev.toยท2dยท
Discuss: DEV
๐Ÿ”Vector Forensics
Top AI Tools for Software Development Teams in 2025
dev.toยท1dยท
Discuss: DEV
โšกProof Automation
Buy Verified Skrill Account - Best Verified Account 2023
dev.toยท1dยท
Discuss: DEV
๐Ÿ”—Data Provenance
How XWorm is fueling the rise of plug-and-play malware
techradar.comยท1d
๐Ÿ”“Hacking
Designing user interfaces with bots not buttons
interconnected.orgยท1dยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธTerminal Renaissance