August 2024 Archive
11821.
SSH Remote Access No Port-Forwarding No Cloudflare (4rkal.eu.org)
11822.
The Age of Concurrency (deprogrammaticaipsum.com)
11823.
Small but Mighty: Introducing answerai-colbert-small (answer.ai)
11824.
I Was an Escort for the 1%. It's Not What You Think (wsj.com)
11825.
Ray Tracing in One Weekend (discourse.haskell.org)
11826.
Parents who use humor have better relationships with their children, study finds (psu.edu)
11827.
NIST Releases First 3 Finalized Post-Quantum Encryption Standards (nist.gov)
11828.
How Worldcoin Is Building Digital IDs to Combat the AI Apocalypse (bloomberg.com)
11829.
General Motors accused of selling data to insurers on 'bad' habits of drivers (news.sky.com)
11830.
Django: Create sub-commands within a management command (adamj.eu)
11831.
Laser Fault Injection for the Masses (blog.fraktal.fi)
11832.
Lix 2.91 "Dragon's Breath" (lix.systems)
11833.
DC-ROMA RISC-V Laptop II [video] (Explaining Computers) (youtube.com)
11834.
Texas Sues General Motors for Collecting and Selling Driver Data (nytimes.com)
11835.
Default to Large Modules (two-wrongs.com)
11836.
11837.
islice() (twitter.com)
11838.
Use R to prompt a local LLM with ollamar (blog.stephenturner.us)
11839.
Superhighway84 a uncensorable decentralized internet discussion system (github.com)
11840.
Playstation's surprise new hardware is already selling out (gamingbible.com)
11841.
Telemetry.sh – Simplifying telemetry measurement in your codebase (docs.telemetry.sh)
11842.
Logsnag – Realtime monitoring for your entire business (docs.logsnag.com)
11843.
Show HN: Turning a Live Video into Instant Purchases Using AI (live-stream-shopper.cerebrium.ai)
11844.
'SinkClose' AMD CPU vulnerability explained: How dangerous is it really? (zdnet.com)
11845.
Notebook-Native CI/CD: Runme for Dagger (runme.dev)
11846.
CocoaPods Support and Maintenance Plans (blog.cocoapods.org)
11847.
DC-ROMA RISC-V Laptop II (youtube.com)
11848.
Iranian banks hit by major cyber attack, reportedly one of largest in history (i24news.tv)
11849.
Crime Fiction Must Not Ignore Computer Crime (crimereads.com)
11850.
Closed-Form 3x3 Matrix Decompositions (theorangeduck.com)