2 Billion Email Addresses Were Exposed, and We Indexed Them All in Have I Been Pwned
troyhunt.com·1d
🔒Security
Flag this post
Upbeat Technology's RISC-V MCU Takes Flight with Near-Threshold Computing
🥧Raspberry Pi
Flag this post
Dive into Systems
🔧Code Refactoring Patterns
Flag this post
The Twilio-Stytch Acquisition: A Watershed Moment for Developer-First CIAM
📱Progressive Web Apps
Flag this post
The Same Feature That Makes a Component Powerful Can Also Make It Dangerous
🔎Static Analysis
Flag this post
Introducing Agent-o-rama: build, trace, evaluate, and monitor stateful LLM agents in Java or Clojure
💬AI Code Assistants
Flag this post
An open-source conflict has emerged between Google and FFmpeg regarding AI-identified software vulnerabilities
🛡Vulnerability Management
Flag this post
Show HN: ClipGuard- A PySide6 clipboard guardian with masking and history search
🔍Code Review Automation
Flag this post
Writing Tests for Larger Font Sizes with Compose: Scrolling and Text Truncation
📸Visual Regression Testing
Flag this post
AndesVL Technical Report: An Efficient Mobile-side Multimodal Large LanguageModel
🧩LLM Integration
Flag this post
Part 6B — SaijinOS: Care-Based AI Architecture (Why an OS Must Learn to Breathe)
🐌Slow Tech / Humane Computing
Flag this post
Loading...Loading more...