How I Used Smart Glasses to Trick a Bartender Into Giving Me a Free Drink
lifehacker.comยท2d
๐Ÿ“ผCassette Hacking
Flag this post
Bitmovin (YC S15) Is Hiring Engineering ICs and Managers in Europe
bitmovin.comยท1dยท
Discuss: Hacker News
๐ŸŽฅStreaming Codecs
Flag this post
The Power of Framework Dimensions: What Data Scientists Should Know
towardsdatascience.comยท15h
๐Ÿ“‡Indexing Strategies
Flag this post
The Magic of Precision Engineering
hightechinstitute.nlยท1dยท
Discuss: Hacker News
โ˜•Precision Brewing
Flag this post
Programming Modern Systems Like It Was 1984 (2014)
prog21.dadgum.comยท1dยท
Discuss: Lobsters
๐Ÿ”ฉSystems Programming
Flag this post
Nanoimprint Lithography: Stop Saying It Will Replace EUV
newsletter.semianalysis.comยท15hยท
Discuss: Hacker News
๐Ÿ“„Document Digitization
Flag this post
A Practical Tour of How Code Runs: Binaries, Bytecode and Shared Libraries
cefboud.comยท1dยท
Discuss: r/programming
๐Ÿ”ฉSystems Programming
Flag this post
Distroless Containers for Corporate Use: Nix Flakes vs. Fedora
blog.riemann.ccยท15hยท
โ„๏ธNix Adoption
Flag this post
Golang for physics
reddit.comยท5hยท
Discuss: r/golang
๐ŸงฎTheoretical Computer Science
Flag this post
CDrugRed: A Chinese Drug Recommendation Dataset for Discharge Medications in Metabolic Diseases
arxiv.orgยท3h
๐Ÿ”Information Retrieval
Flag this post
Automated Geospatial Anomaly Detection Using Multi-Source Data Fusion & Bayesian Inference
dev.toยท1dยท
Discuss: DEV
๐Ÿ“กFeed Archaeology
Flag this post
How to Consistently Extract Metadata from Complex Documents
towardsdatascience.comยท2d
๐Ÿค–Archive Automation
Flag this post
Writing a competitive BZip2 encoder in Ada from scratch in a few days - part 4: programming
gautiersblog.blogspot.comยท1dยท
๐Ÿ“ฆDeflate
Flag this post
How the Mayans were able to accurately predict solar eclipses for centuries
phys.orgยท19hยท
Discuss: Hacker News
๐Ÿ“ฐRSS Archaeology
Flag this post
Book Reading vs AI
dev.toยท1dยท
Discuss: DEV
๐Ÿค–AI Curation
Flag this post
Microsoft 365 Copilot โ€“ Arbitrary Data Exfiltration via Mermaid Diagrams
dev.toยท5hยท
Discuss: DEV
๐Ÿ”“Hacking
Flag this post
The Nuclear Analogy in AI Governance Research
arxiv.orgยท3h
๐Ÿ”ฒCellular Automata
Flag this post
Rationalizable Screening and Disclosure under Unawareness
arxiv.orgยท3h
๐Ÿ•ณ๏ธInformation Leakage
Flag this post