Handoffs vs. flowcharts for agents, in light of OpenAI's visual builder
blog.rowboatlabs.com·18h·
Discuss: Hacker News
🔌Interface Evolution
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·1d
🔐Cryptographic Archaeology
AI Tulips
mamund.substack.com·2h·
Discuss: Substack
🤖AI Curation
JSON Schema Compatibility and the Robustness Principle
yokota.blog·16h·
Discuss: Hacker News
📋Protocol Buffers
Hardware Stockholm Syndrome
programmingsimplicity.substack.com·1d·
Discuss: Substack
🔩Systems Programming
Introducing the Gemini 2.5 Computer Use model
blog.google·13h·
Discuss: Hacker News
🎙️Whisper
Show HN: Timelinize – Privately organize your own data from everywhere, locally
timelinize.com·16h·
Discuss: Hacker News
Time Capsule Networks
How a top bug bounty researcher got their start in security
github.blog·16h
🔓Hacking
Digital Twins for Intelligent Intersections: A Literature Review
arxiv.org·4h
🌀Differential Geometry
Security Model: Wayland vs. Xorg in Linux
openlib.io·1d·
Discuss: Hacker News
🛡️RISC-V Security
I struggle to find old messages in ChatGPT conversations
ai-answer-saver.vercel.app·10h·
Discuss: Hacker News
🎙️Whisper
Show HN: Sovant – Memory that works across OpenAI, Claude and Gemini
sovant.ai·16h·
Discuss: Hacker News
Hardware Transactional Memory
Reflections on Big Tech
micro.mu·2h·
Discuss: Hacker News
🧲Magnetic Philosophy
A Solution to the Paperclip Problem
link.springer.com·1d·
Discuss: Hacker News
🔲Cellular Automata
Python 3.14 Released with Template String Literals, Deferred Annotations, and
socket.dev·10h·
Discuss: Hacker News
💧Liquid Types
Fitting It All in Your Head
systemsapproach.org·2d·
Discuss: Hacker News
📡BGP Archaeology
Why did the über-protocols fail? A history of OOP RPC
medium.com·2d·
Discuss: Hacker News
🔌Interface Evolution
Shaken or Stirred? An Analysis of MetaFormer's Token Mixing for Medical Imaging
arxiv.org·4h
📄Document Streaming
What modern programming feels like
news.ycombinator.com·7h·
Discuss: Hacker News
🔩Systems Programming