The great butterfly heist: how a gentleman collector stole thousands of butterflies from Australian museums
theguardian.comยท8h
๐Ÿ”Cassette Forensics
BBKB Community
bbkb-community.github.ioยท3dยท
Discuss: Hacker News
โŒจ๏ธMechanical Keyboards
Numeric Pager Code Encoder Tool (Look Alike Cipher)
fcsuper.blogspot.comยท3dยท
๐Ÿ”คCharacter Encoding
Skills I Was Missing as a MongoDB User
mongodb.comยท2dยท
Discuss: Hacker News
๐Ÿง Query Planners
Dangerous DNS malware infects over 30,000 websites - so be on your guard
techradar.comยท1d
๐Ÿ›ฃ๏ธBGP Hijacking
RFC 9794: a new standard for post-quantum terminology
ncsc.gov.ukยท3dยท
Discuss: Hacker News
๐Ÿ“กNetwork Protocol Design
RFC 677: Maintenance of duplicate databases (1975)
rfc-editor.orgยท5dยท
Discuss: Hacker News
๐Ÿ›ก๏ธPreservation Proofs
Domain Driven Design in Clojure with Generalized Hiccup
biotz.ioยท2dยท
๐Ÿ”—Functional Compilers
Safeguarding Content Quality Against AI "Slop"
blog.iil.comยท2dยท
Discuss: Hacker News
๐Ÿค–AI Curation
Haskell WebAssembly for Browser Interaction
funwithfunctions.comยท4dยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
Ask HN: How do you handle the gaps between design, product, and engineering?
news.ycombinator.comยท9hยท
Discuss: Hacker News
โš™๏ธProof Engineering
Overlooked ubiquitin precursor promotes cellular stress resistance and longevity
phys.orgยท2d
๐ŸงฌCopy Number Variants
Asked to do something illegal at work? Here's what these software engineers did
dev.toยท14hยท
Discuss: DEV
โš–๏ธLegal Compliance
New Paper Proposes โ€˜Attested DNSโ€™ to Secure Domain Names with Trusted Hardware
circleid.comยท2d
๐ŸŒDNS Security
Gear News of the Week: Adobe Premiere Lands on iPhone, and Nothing Lets You Design Your Own Widgets
wired.comยท17h
๐Ÿ—œ๏ธLZW Variants
A Developerโ€™s Deep Dive with Python
dev.toยท1dยท
Discuss: DEV
๐Ÿ”—Hash Chains
How I Replaced Eventbrite With a Lean No-Code Stack for Multi-City Events
hackernoon.comยท1d
๐Ÿ”BitFunnel
The Media Bias Detector: A Framework for Annotating and Analyzing the News at Scale
arxiv.orgยท3d
๐Ÿ“ฅFeed Aggregation
Do AI-designed proteins create a biosecurity vulnerability?
arstechnica.comยท1dยท
Discuss: Hacker News
๐ŸŒธBloom Variants