Side project foiled - restoration of an IBM 3278 terminal
rescue1130.blogspot.com·1d·
🗃️Punch Card Recovery
The Pros and Cons of Zero Trust
cacm.acm.org·2d
🔓Hacking
My requests for Interop 2026
clagnut.com·4d
🖋Typography
How to prevent account takeover fraud: 7 strategies that work
fingerprint.com·1h
🎫Kerberos Attacks
The Roadmap for Mastering AI-Assisted Coding in 2025
machinelearningmastery.com·1d
🗺️Competency Maps
The Real Python Podcast – Episode #265: Python App Hosting Choices & Documenting Python's History
realpython.com·9h
🏺ZIP Archaeology
The 100MHz 6502
e-basteln.de·1d·
Discuss: Hacker News
Homebrew CPUs
“GoLand Can Do That?” Ten Secret Superpowers You Might Not Know
blog.jetbrains.com·4d·
🔓Reverse engineering
Reasonably accurate, privacy conscious, cookieless, visitor tracking for WordPress
shkspr.mobi·1d·
🌐WARC Forensics
Magical systems thinking
worksinprogress.co·12h·
Discuss: Hacker News
⚙️systems theory
7 Essential CISM Certification Requirements You Must Know
dev.to·1d·
Discuss: DEV
🎯Threat Hunting
Attackers hijacked popular NPM packages to replace crypto wallet addresses
exaforce.com·3d·
Discuss: Hacker News
🎫Kerberos Attacks
New parametric CAD BREP kernel attempt
github.com·3d·
Discuss: Hacker News
🌐Computational Topology
[Media] Kuwahara Filter Running with Rust + WGSL
reddit.com·1d·
Discuss: r/rust
🦀Rust Borrowing
Survey Surfaces Software Engineering Challenges Following Adoption of AI
devops.com·1d
📏Code Metrics
ALL-PET: A Low-resource and Low-shot PET Foundation Model in the Projection Domain
arxiv.org·17h
🗜️LZW Variants
Key Takeaways from AWS Community Day Baltic 2025: Attendee Insights
dev.to·14h·
Discuss: DEV
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Circular Imports in Python: The Architecture Killer That Breaks Production
dev.to·4d·
Discuss: DEV
💧Liquid Types
Quantum Composition: Teaching AI to Think Like Us
dev.to·7h·
Discuss: DEV
🕸️Tensor Networks
ChatGPT Code Reviews: How AI Feedback in 3 Minutes Beat Human Reviews Every Time
dev.to·1d·
Discuss: DEV
📏Code Metrics