~hackernews | Bookmarks (12174)
-
College Towns: Urbanism from a Past Era with Ryan Allen
Art Deco City From Time and JerryToday, I bring you an interview with Ryan Allen. Ryan...
-
Dot (YC S21) is hiring a sales engineer to automate analytics (fully remote)
Chat with your Data Warehouse$1.7K - $2.5K / 0.30% - 0.50%Connect directly with founders of the...
-
The most famous carbon dioxide absorber
Unless you are an anaesthetist, you probably wouldn’t know what a carbon dioxide absorber is (red...
-
IBM orders US sales to locate near customers, RTO for cloud staff, DEI purge
Exclusive IBM, which employees wryly or ruefully say stands for I've Been Moved, is once again...
-
Walled Gardens Can Kill
I'm an Apple ecosystem user, owning an iPhone ever since a past employer got it for...
-
A New ASN.1 API for Python
If you’ve ever worked with cryptography, PKI schemes, or low-level networking in Python, you’ve likely encountered...
-
Using –/.ssh/authorized keys to decide what the incoming connection can do
~/.ssh/authorized_keys allows you to specify the command run by the incoming ssh connection. I was searching...
-
Startup Exercise: What can't be solved with money? (2011)
by Jason Cohen on March 21, 2011 What can’t be solved with money, are the most...
-
CVE fallout: The splintering of the standard vulnerability tracking system
Comment The splintering of the global system for identifying and tracking security bugs in technology products...