Startup provides a nontechnical gateway to coding on quantum computers
phys.orgยท52m
๐Ÿ”Quantum Security
Flag this post
Shell Grotto: England's mysterious underground seashell chamber
boingboing.netยท3hยท
Discuss: Hacker News
๐Ÿ”Tape Forensics
Flag this post
What if software shipped with a software engineer?
manuel.kiessling.netยท16h
๐Ÿ”„Language Evolution
Flag this post
Ten Blue Links "Toxic optimisation" edition
ianbetteridge.comยท20h
๐Ÿ–ฅ๏ธTerminal Renaissance
Flag this post
Quindar Tone Generator
curiousmarc.comยท1dยท
Discuss: Hacker News
โšกCircuit Archaeology
Flag this post
This Month in Ladybird โ€“ October 2025
ladybird.orgยท2hยท
Discuss: Hacker News
๐ŸŽฌWebCodecs
Flag this post
Labs for Broke โ€“ EKS for Pennies
georgedeblog.comยท9hยท
Discuss: Hacker News
๐Ÿ Homelab Federation
Flag this post
I Processed the Internet on a Single Machine to Find Valuable Expired Domains
blog.mbrt.devยท1hยท
Discuss: Hacker News
๐Ÿ”BitFunnel
Flag this post
Runs-On: Mac
runs-on-mac.comยท3dยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธModern Terminals
Flag this post
Apache Arrowโ€™s Final Frontier: Replacing Outdated Database Drivers
thenewstack.ioยท21h
๐Ÿ—„๏ธDatabase Internals
Flag this post
Real-time stock volatility prediction with deep learning on a time-series DB
medium.comยท6hยท
Discuss: Hacker News
๐ŸŒŠStreaming Databases
Flag this post
Pelican-VL 1.0: A Foundation Brain Model for Embodied Intelligence
arxiv.orgยท9h
๐Ÿ”ฒCellular Automata
Flag this post
Feature-Guided Analysis of Neural Networks: A Replication Study
arxiv.orgยท9h
๐Ÿง Machine Learning
Flag this post
Predicting Encoding Energy from Low-Pass Anchors for Green Video Streaming
arxiv.orgยท9h
๐Ÿง Learned Codecs
Flag this post
Automated Defect Prediction via Cross-Entropy Regularized Graph Neural Networks for Microservice Architectures
dev.toยท13hยท
Discuss: DEV
๐Ÿ”—Topological Sorting
Flag this post
After the Last Git Commit
gist.github.comยท1dยท
Discuss: Hacker News
๐Ÿ”„Language Evolution
Flag this post
Chain of Pattern: Rethink
dev.toยท1dยท
Discuss: DEV
๐Ÿ“Code Metrics
Flag this post
Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.comยท2d
๐Ÿ’ฃZIP Vulnerabilities
Flag this post
Investigating Search Among Physical and Virtual Objects Under Different Lighting Conditions
arxiv.orgยท9h
๐ŸŒˆColor Science
Flag this post
Assessing DRAM Data Retention via Quantum-Tunneling Lifetime Mapping
dev.toยท1dยท
Discuss: DEV
โš›๏ธQuantum Tape
Flag this post