Restoration work on 2501 card reader - card path and stacker
rescue1130.blogspot.comยท2dยท
๐Ÿ’พFloppy Imaging
A Shadow of Triality?
golem.ph.utexas.eduยท2d
๐Ÿ”ฒProof Irrelevance
Podcast Ep. 505 | Excessful
theminimalists.comยท9h
โฌœMinimalism
Best infosec-related long reads for the week of 9/6/25
metacurity.comยท2d
๐Ÿ›กCybersecurity
Basic Guide to Einsum
ajcr.netยท1dยท
Discuss: Hacker News
๐Ÿ“Error Bounds
A Look at Nix and Guix
lwn.netยท15hยท
Discuss: Hacker News
โ„Nix
What Is the Fourier Transform?
hackaday.comยท2d
๐Ÿ“ŠSpectral Analysis
Airlines Rely on the Cloud
cacm.acm.orgยท2h
๐ŸŒŠStreaming Systems
GPTโ€‘5-Codex and upgrades to Codex
simonwillison.netยท2hยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
DNA metabarcoding uncovers woodrats' selective approach to eating toxic plants
phys.orgยท2h
๐Ÿค–Grammar Induction
MVS-sysgen/sysgen: Jay Moseley MVS 3.8j sysgen automation
github.comยท2hยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Bytedance's new AI
reddit.comยท5dยท
Discuss: r/artificial
๐Ÿ—œ๏ธLZW Variants
Autonomous Labs: Can AI Accelerate Discovery 100x? by Arvind Sundararajan
dev.toยท4hยท
Discuss: DEV
๐Ÿค–AI Curation
How XWorm is fueling the rise of plug-and-play malware
techradar.comยท3d
๐Ÿ”“Hacking
Q&A: New DNA techniques reveal unseen soil bacteria and antibiotic candidates
phys.orgยท1d
๐ŸงฌCopy Number Variants
Systematic fraud uncovered in mathematics publications
phys.orgยท4h
๐Ÿ“šArchive Mathematics
Ionospheric Dynamo Modeling via Spatio-Temporal Graph Neural Networks for Predictive Space Weather Forecasting
dev.toยท19hยท
Discuss: DEV
๐Ÿ“ˆTime Series
A Taxonomy of Response Strategies to Toxic Online Content: Evaluating the Evidence
arxiv.orgยท17h
๐Ÿ“ŠFeed Optimization
Building MCP servers with Docker: NetworkChuck's tutorial and starter kit
github.comยท8hยท
Discuss: Hacker News
๐Ÿ“ปHomebrew Protocols
The Art of Automation: Custom Coding vs. n8n โ€“ A Comprehensive Comparative Analysis
dev.toยท1dยท
Discuss: DEV
๐Ÿ“Code Metrics