A defender’s guide to phishing
redcanary.com·2d
🎯Threat Hunting
Flag this post
Molten-Salt Reactor
⚙️RISC-V Microcode
Flag this post
Crossplane's CNCF Graduation
🔓Open Source Software
Flag this post
1967 speech about progress, computers, and staying human in an age of automation
🇬🇧British Computing
Flag this post
Storybook 10
🎯Gradual Typing
Flag this post
Everyone's Getting Trapped by Hosting Renewals. Here's What I Did About It
🔄Sync Engine
Flag this post
Readtape: Decode the analog waveform extracted from old computer mag tapes
📼Cassette Archaeology
Flag this post
A crisis at chipmaker Nexperia sent automakers scrambling. Here's what to know
the-independent.com·1h
🇳🇱Dutch Computing
Flag this post
Show HN: OpenHealth – AI health platform with RAG over 38M medical papers
🌀Brotli Internals
Flag this post
Thoughts on Kimi K2 Thinking
interconnects.ai·2d
🧠Intelligence Compression
Flag this post
Day 2 of building Secrin
🔗Topological Sorting
Flag this post
NDC Conferences: The future & challenges of cloud - Anders Lybecker - NDC Copenhagen 2025
🏠Homelab Orchestration
Flag this post
The Peril of Preference: Why GRPO fails on Ordinal Rewards
arxiv.org·1d
✨Effect Handlers
Flag this post
Micron: Too Cheap To Stop Buying
seekingalpha.com·1d
🔍BitFunnel
Flag this post
Show HN: ReadMyMRI DICOM native preprocessor with multi model consensus/ML pipes
🔄Archival Workflows
Flag this post
Part 5: Building Station Station - Should You Use Spec-Driven Development?
🏠Homelab Pentesting
Flag this post
How I Automated My Client Onboarding — And Saved 10+ Hours Every Week
📊Feed Optimization
Flag this post
State of the Source at ATO 2025: Cybersecurity
opensource.org·4d
🔓Open Source Software
Flag this post
Loading...Loading more...