Record-breaking electric truck delivery beats diesel equivalent
bigrigs.com.auยท14hยท
Discuss: Hacker News
๐Ÿ›๏ธTechnical Architecture
Flag this post
The streak of not opening Instagram
kevin3010.github.ioยท19hยท
Discuss: Hacker News
๐Ÿช™cryptocurrency
Flag this post
The Relentless Pursuit of the Vorschlag
vomtag.comยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust Systems
Flag this post
Utah Digital Choice Act: giving users data & encouraging platform competition
ash.harvard.eduยท18hยท
Discuss: Hacker News
๐Ÿ”Post-Quantum Cryptography
Flag this post
Congressional Budget Office hacked, China suspected in breach
cnn.comยท1hยท
Discuss: Hacker News
๐Ÿ”’Security Engineering
Flag this post
Two years without Google, et al. -- has it been worth it?
kevinboone.meยท1dยท
Discuss: Hacker News
๐Ÿค–AI
Flag this post
What's Next in Customer Identity and Access Management
kuppingercole.comยท5dยท
Discuss: Hacker News
๐Ÿ”’Security Engineering
Flag this post
Who Wrote That Headline? Maybe a Robot.
nytimes.comยท1dยท
๐Ÿค–AI
Flag this post
Man Pages (Part 1)
abochannek.github.ioยท2dยท
๐Ÿ”Post-Quantum Cryptography
Flag this post
Claude Code Custom Commands: 3 Practical Examples and When to (Not) Use Them
aiengineering.reportยท1dยท
Discuss: Hacker News
๐ŸšขDevOps Automation
Flag this post
The Same Feature That Makes a Component Powerful Can Also Make It Dangerous
blog.zast.aiยท4dยท
Discuss: Hacker News
๐Ÿ›๏ธTechnical Architecture
Flag this post
Core Product, Whole Product
turtlespace.blogยท1dยท
Discuss: Hacker News
๐Ÿ›๏ธTechnical Architecture
Flag this post
What does the ideal information environment look like?
defenderofthebasic.substack.comยท5dยท
Discuss: Substack
๐Ÿ”Post-Quantum Cryptography
Flag this post
Averting Collapse Is No Longer Profitable
thehonestsorcerer.substack.comยท1dยท
Discuss: Substack
๐Ÿ›๏ธTechnical Architecture
Flag this post
Microservices? No, modularity is what matters
binaryigor.comยท4dยท
Discuss: Hacker News
๐Ÿ›๏ธTechnical Architecture
Flag this post
Fil-C
graydon2.dreamwidth.orgยท3dยท
๐Ÿฆ€Rust Systems
Flag this post
T-Mobile accessed a whistleblower's personal cell phone account to identify him
medium.comยท2dยท
Discuss: Hacker News
๐Ÿ”’Security Engineering
Flag this post
Open-weight training practices and implications for CoT monitorability
lesswrong.comยท4d
๐Ÿ”Post-Quantum Cryptography
Flag this post
Become the Consequence
randsinrepose.comยท4dยท
Discuss: Hacker News
๐Ÿ’กEntrepreneurship
Flag this post
Statistical Estimate of Occurrence of Extraterrestrial Intelligence in Milky Way
arxiv.orgยท7hยท
Discuss: Hacker News
๐Ÿค–AI
Flag this post