Retrospective on the introduction of the Vanguard anti-cheat software to League of Legends Article 4597 words, published Aug 22 2024 16 votes
Seek and you shall find — A list of recent updates that make Ready Player a better media player and manager for Emacs open source Article 1038 words, published Sep 7 2024 6 votes
Types and other techniques as an accessibility tool for the ADHD brain - Michael Newton Video 1:00:47, published Sep 5 2024 20 votes
The moral implications of being a moderately successful computer scientist and a woman Article 2252 words, published Aug 5 2024 27 votes
Emacs Writing Studio — A comprehensive guide for writers seeking to streamline their workflow using Emacs open source Link 8 votes
Why not just do simple C++ RAII in C? programming programming languages Article 5783 words, published May 21 2024 10 votes
Zig: The small language (2022) programming programming languages Article 790 words, published Jun 1 2022 17 votes
Generating sudokus for fun and no profit programming Article 2152 words, published Jun 25 2024 26 votes
Game publisher claims 100% crash rate with Intel CPUs – Alderon Games says company sells defective 13th and 14th gen chips Article 378 words 31 votes
AMD vs. NVIDIA Vulkan ray-tracing performance on Linux with breaking limit linux Article 416 words 10 votes
How to create a Mastodon account for your WordPress blog in five minutes Article 838 words, published Sep 20 2023 6 votes
What to know before you implement public-facing APIs programming Article 1685 words, published May 29 2024 9 votes
"Badness 0", a suckerpinch/tom7 video dive into typesetting, LLMs, and Donald Knuth Video 22:15 29 votes
Four in five CISOs have been told to downplay a potential risk’s severity security.cyber Article 661 words 9 votes
How we used esbuild to reduce our browser extension build times by 90% web development Article 3157 words 12 votes
Significant cyber incidents | Strategic technologies program security.cyber Article 8881 words 1 vote
Cloudflare uses deceptive business practices to bully customers into unnecessary enterprise plans Video 44:41 18 votes
Cybercriminals pose as "helpful" Stack Overflow users to push malware security.cyber Article 488 words 19 votes
Secrets from the algorithm: Google Search’s internal engineering documentation has leaked Link 30 votes