The inter-generational struggle to find clothes that fit more than a tiny portion of women...
puppion
an hour ago
European Tech Alternatives
Find European tech, software, and service alternatives that respect your data sovereignty, are GDPR compliant, and store data in Europe.
todsacerdoti
12 hours ago
DNS-Persist-01: A New Model for DNS-Based Challenge Validation
When you request a certificate from Let’s Encrypt, our servers validate that you control the hostnames in that certificate using ACME challenges. For subscribers who need wildcard certificat...
a7b3fa
4 days ago
Making a font with ligatures to display thirteenth-century monk numerals
As the title implies, I just created a font that displays numbers in a compact format used by Cistercian monks . You can play with it on my demo site here :...
joebig
3 days ago
The true history of the Minotaur: what archaeology reveals
Prisonnière du Labyrinthe, cette créature mi-homme mi-taureau a hanté la tradition orale de la Grèce et de la Rome antiques....
sz4kerto
14 hours ago
Tailscale Peer Relays is now generally available
Work around hard NATs and tricky networks with production-grade connectivity nodes you control...
tuananh
5 hours ago
Minecraft Java is switching from OpenGL to Vulkan
Work continues for the Vibrant Visuals update to come to Minecraft Java, and as part of that they're switching the rendering from OpenGL to Vulkan....
ellieh
8 hours ago
Your Agent Framework Is Just a Bad Clone of Elixir
Python and JavaScript/TypeScript AI frameworks are reinventing what telecom solved in 1986. What 40 years of production-grade concurrency teaches us about building AI agents....
jfantl
12 hours ago
Cosmologically Unique IDs
We are an exploratory species, just past the solar system now, but perhaps one day we will look back and call our galaxy merely the first. There are many problems to solve along the way, and...