Desire to Pop
tante.cc·15h
🔲Cellular Automata
Flag this post
Implementation of a Java Processor on a FPGA
mavmatrix.uta.edu·3d·
Discuss: Hacker News
Homebrew CPUs
Flag this post
One Swift mistake everyone should stop making today
hackingwithswift.com·4d·
Discuss: Hacker News
🔣Unicode
Flag this post
PHP 8.5 Brings Long-Awaited Pipe Operator, Adds New URI Tools
developers.slashdot.org·13h
📝Shell Parsing
Flag this post
A New Bridge Links the Strange Math of Infinity to Computer Science
quantamagazine.org·1d·
📐Mathematical Art
Flag this post
Surprisingly, Emacs on Android is pretty good
kristofferbalintona.me·7h·
Discuss: Hacker News
📟Terminals
Flag this post
Type-safe `net/rpc` alternative with context support
reddit.com·18h·
Discuss: r/golang
gRPC
Flag this post
Show HN: Free SEO Image Generator WordPress Plugin – Rule Based and Zero AI
github.com·1d·
Discuss: Hacker News
📸PNG Optimization
Flag this post
Breaking News: OpenAI Rebrands to OpaqueAI
dev.to·16h·
Discuss: DEV
🎙️Whisper
Flag this post
ECPv2: Fast, Efficient, and Scalable Global Optimization of Lipschitz Functions
arxiv.org·2d
🧠Machine Learning
Flag this post
Show HN: Building a no-code browser automation system for OSINT
github.com·53m·
Discuss: Hacker News
🌀Brotli Internals
Flag this post
Nano Banana Pro (4K) at $0.04/image
seedreamimage.com·53m·
Discuss: Hacker News
🕸️WebP Analysis
Flag this post
Building an impossible Tic-Tac-Toe with Minimax and LemonadeJS
dev.to·19h·
Discuss: DEV
⚔️Lean Tactics
Flag this post
Crawler-Detect: A PHP Library for Bot Detection
dev.to·9h·
Discuss: DEV
🎯Threat Hunting
Flag this post
Over-Regulation Is Doubling the Cost
rein.pk·3d·
🖥️Modern Terminals
Flag this post
Human-aligned Quantification of Numerical Data
arxiv.org·2d
🧠Intelligence Compression
Flag this post
Show HN: Mamba2-Jax; Mamba2 implemented in pure Jax/Flax
github.com·1d·
Discuss: Hacker News
💧Liquid Types
Flag this post
How To Build a Graph-Based Recommendation Engine Using EDG and Neo4j
towardsdatascience.com·1d
🕸️Neo4j
Flag this post
TopoReformer: Mitigating Adversarial Attacks Using Topological Purification in OCR Models
arxiv.org·2d
🤖Advanced OCR
Flag this post