From Word to the web: How IEC authors are embracing Online Standards Development
fontoxml.comΒ·1d
πŸ“‹Document Standards
Forensic Video Workflow with Amped FIVE – Part One: First Steps, Verification and File Considerations
blog.ampedsoftware.comΒ·1d
βš–οΈDigital Evidence
Defining a Standard Taxonomy for Segmentation
blogs.cisco.comΒ·1d
🎯Threat Hunting
Choosing between PostgreSQL and SQLite
kerkour.comΒ·1dΒ·
Discuss: Hacker News
πŸ’ΎSQLite
Aesthetics matter
lemire.meΒ·12hΒ·
Discuss: Hacker News
πŸ”’Coding Theory
digital-asset/cn-quickstart
github.comΒ·1d
πŸ”„Sync Engine
Hacktoberfest shouldn't be AI generated PRs
iparaskev.comΒ·1dΒ·
Discuss: Hacker News
πŸš€Indie Hacking
Let's Prove Leftpad
github.comΒ·1dΒ·
Discuss: Hacker News
πŸ“œProof Carrying Code
A Wave of Resignations in the Aftermath of Remote Onboarding
arxiv.orgΒ·22h
πŸ¦‹Format Metamorphosis
Leveraging Vision Transformers for Enhanced Classification of Emotions using ECG Signals
arxiv.orgΒ·22h
🧠Neural Codecs
Kubernetes v1.34 Introduces Benefits but Also New Blind Spots
thenewstack.ioΒ·1d
πŸ“¦Container Security
Safe and Compliant Cross-Market Trade Execution via Constrained RL and Zero-Knowledge Audits
arxiv.orgΒ·1d
🌳Archive Merkle Trees
Transductive and Learning-Augmented Online Regression
arxiv.orgΒ·1d
πŸ”Information Retrieval
COSMIR: Chain Orchestrated Structured Memory for Iterative Reasoning over Long Context
arxiv.orgΒ·1d
πŸŒ€Brotli Internals
Linux 6.18 USB Brings Intel USBIO Drivers, Offload Improvements
phoronix.comΒ·8h
πŸ”ŒOperating system internals
Automated Quantum Dot Spectral Analysis for High-Throughput Materials Characterization
dev.toΒ·1dΒ·
Discuss: DEV
🌈Spectroscopy
I am building a document api suite that gives you coordinates for every answer
dev.toΒ·11hΒ·
Discuss: DEV
πŸ“„Document Digitization
The best Prime Day SSD deals: Save on gear from Samsung, Crucial, Seagate and others
engadget.comΒ·3d
πŸ”’Secure Boot
The Many Memory Management Improvements In Linux 6.18
phoronix.comΒ·1dΒ·
Discuss: Hacker News
πŸ”©Systems Programming
The ReD Hat Consulting Breach – An Analysis
digitalforensicsmagazine.comΒ·1d
πŸ”“Hacking