owencutajar.bsky.social
@owencutajar.bsky.social
A New Bridge Links the Strange Math of Infinity to Computer Science | Quanta Magazine
A New Bridge Links the Strange Math of Infinity to Computer Science | Quanta Magazine
Descriptive set theorists study the niche mathematics of infinity. Now, they’ve shown that their problems can be rewritten in the concrete language of algorithms.
www.quantamagazine.org
November 26, 2025 at 12:09 PM
Jade Rubick - How to build silos and decrease collaboration (on purpose) www.rubick.com/how-to-build...
How to build silos and decrease collaboration (on purpose)
2021-08-25scalingcommunicationcompany-cultureorg-designinformation-flowhacker-news
www.rubick.com
November 1, 2025 at 12:09 PM
Courts don’t know what to do about AI crimes
Courts don’t know what to do about AI crimes
AI-generated images and videos are stumping prosecutors in Latin America, even as courts embrace AI to tackle case backlogs.
restofworld.org
October 18, 2025 at 3:53 PM
AI has a cargo cult problem
AI has a cargo cult problem
Spending vast sums and inflating an investment bubble is no guarantee of unleashing technological magic
www.ft.com
October 18, 2025 at 11:09 AM
Your data model is your destiny
Your data model is your destiny
Your product's core abstractions determine whether new features compound into a moat or just add to a feature list. Here's how to get it right.
notes.mtb.xyz
October 17, 2025 at 11:09 AM
Command Interface: How Your Device Choice Shapes Power Relations
Command Interface: How Your Device Choice Shapes Power Relations
Laptops create. Phones consume. The split determines who commands and who complies—a power dynamic hiding in plain sight across every interface we touch.
zakelfassi.com
October 5, 2025 at 3:53 PM
The AI coding trap | Chris Loy
The AI coding trap | Chris Loy
If you ever watch someone “coding”, you might see them spending far more time staring into space than typing on their keyboard.
chrisloy.dev
September 29, 2025 at 11:09 AM
We Hacked Burger King: How Authentication Bypass Led to Drive-Thru Audio Surveillance
We Hacked Burger King: How Authentication Bypass Led to Drive-Thru Audio Surveillance
Critical authentication bypass vulnerabilities in Restaurant Brands International's assistant platform allowed complete control over 30,000+ Burger King, Tim Hortons, and Popeyes locations worldwide…
web.archive.org
September 7, 2025 at 3:53 PM
SQL needed structure
SQL needed structure
Here are two pages from the internet movie database:
www.scattered-thoughts.net
September 6, 2025 at 11:09 AM
GMKTEC K6: coolingfan replacement : r/MiniPCs
From the MiniPCs community on Reddit: GMKTEC K6: coolingfan replacement
Explore this post and more from the MiniPCs community
www.reddit.com
August 28, 2025 at 11:09 AM
Chinese astronauts make rocket fuel and oxygen in space using 1st-of-its-kind 'artificial photosynthesis' www.livescience.com/space/space-...
Chinese astronauts make rocket fuel and oxygen in space using 1st-of-its-kind 'artificial photosynthesis'
Astronauts on board China's "heavenly palace" space station have demonstrated a new way of making rocket fuel products and breathable oxygen by mimicking a chemical reaction in plants. The technology…
www.livescience.com
August 27, 2025 at 11:09 AM
Gartner's Grift Is About To Unravel
Gartner's Grift Is About To Unravel
swyx recognizes $IT as a visionary short in the DX Tips Magic Quadrant of Boomer Relics That No Longer Make Sense
dx.tips
August 14, 2025 at 11:09 AM
LLMs aren’t world models
LLMs aren’t world models
August 10th, 2025
yosefk.com
August 11, 2025 at 11:09 AM
an engineer's perspective on hiring
an engineer's perspective on hiring
hiring in tech is broken and everyone knows it. what can we do better?
jyn.dev
August 9, 2025 at 11:09 AM
jarulraj/periodic-table: A Periodic Table of System Design Principles buff.ly/iz7I41w
GitHub - jarulraj/periodic-table: A Periodic Table of System Design Principles
A Periodic Table of System Design Principles. Contribute to jarulraj/periodic-table development by creating an account on GitHub.
github.com
July 30, 2025 at 11:09 AM
Google Spoofed Via DKIM Replay Attack: A Technical Breakdown buff.ly/HSYIrmF
Google Spoofed Via DKIM Replay Attack: A Technical Breakdown
Learn how a Google spoof used a DKIM replay attack to bypass email security and trick users with a fake subpoena in this real-world phishing case.
easydmarc.com
July 26, 2025 at 11:09 AM