Links
AddDiscover 10 design patterns from the Kubernetes Patterns book that will help you follow basic Kubernetes concepts and design Kubernetes-based applications.
Albums you can hold again
The OSI, the self-appointed arbiter of all things open source, has released its first definition of 'open source' AI.
Streamlining secure communication with ease
Over 30 years of Doom along with a replica of the BFG.
Traceeshark is a plugin for Wireshark that enables security practitioners to quickly investigate security incidents.
The proliferation of new top-level domains (TLDs) has exacerbated a well-known security weakness: Many organizations set up their internal Microsoft authentication systems years ago using domain names in TLDs that didn't exist at the time. Meaning, they are continuously sending…
Lenticular Clock: After making my Moire Clock a got interested in a very similar effect: lenticular animations. You probably have seen this effect before, e.g. on post cards. I remember having a ruler in primary school with a picture of dinosaurs on it that changed d…
A technical overview of SAML works, and how it fits into your product and your customer's business
Easily create beautiful UML Diagrams from simple textual description. There are also numerous kind of available diagrams. It's also possible to export images in PNG, LaTeX, EPS, SVG.
A tiny little JSON parsing library. Contribute to rxi/sj.h development by creating an account on GitHub.
: Zuckercorp and Yandex used localhost loophole to tie browser data to app users, say boffins
Google Photos is getting a tweaked UI and new video editing tools, including AI-powered presets we reported on a while back.
App that shows how full the International Space Station's urine tank is in real time, available for macOS (menu bar), iOS, watchOS and visionOS - Jaennaet/pISSStream
Generate audiobooks from EPUBs, PDFs and text with synchronized captions. - denizsafak/abogen
Researchers in Shanghai break record by factoring 22-bit RSA key using quantum computing, threatening future cryptographic keys.