Articles by based2
1

This Week in Nushell #331 (nushell.sh)

101

2026: The Year of Java in the Terminal? (xam.dk)

77

The compiler is your best friend (daniel-beskin.com)

3

What Is Apache Spark: Complete 2026 Guide to AI-Native Big Data Processing (netcomlearning.com)

2

Flops? musée des Arts et Métiers (arts-et-metiers.net)

1

Akamai buys Fermyon for WASM-based serverless function (devclass.com)

2

Scala Days 2025: Conference Highlights and Talk Recordings (scala-lang.org)

2

South Atlantic Anomaly (wikipedia.org)

2

Uv2nix – Ingest uv workspaces using Nix (github.com/pyproject-nix)

2

What You See Is What It Does: A Structural Pattern for Legible Software Onward! (arxiv.org)

1

Thermodynamic Computing from Zero to One (extropic.ai)

1

Exploring Traces: Agent trajectory walkthroughs from interesting examples (theori.io)

1

Star leaky app of the week: StarDict (theregister.com)

3

Linux laptop PCI dss at ovhcloud (ovhcloud.com)

1

Wallabag 2.6.13 (wallabag.org)

1

LLMs for coding (+ free workflow templates) (n8n.io)

1

Magma (wikipedia.org)

1

Kyo: Toolkit for Scala Development (getkyo.io)

1

Scalar Conference 2025 – Summary and Highlights (softwaremill.com)

2

RFK Jr. & HHS: Last Week Tonight with John Oliver (HBO) [video] (youtube.com)

1

Apache Airflow 3 is Generally Available (apache.org)

3

OpenDesk Architecture (opencode.de)

5

Changes to Microsoft Authenticator Autofill (microsoft.com)

4

Cybersecurity (Anti)Patterns: Busywork Generators (spaceraccoon.dev)

1

OpenStack at the April 2025 PTG: All Things 'Epoxy' & 'Flamingo' (openstack.org)

1

What is encrypted SNI? – How ESNI works (cloudflare.com)

2

Can You Run the Llama 2 LLM on DOS? (yeokhengmeng.com)

1

Wazuh: Open-Source Security Platform. Unified XDR and SIEM Protection for Endpoi (github.com/wazuh)

4

ReVision Party 2ø25 (revision-party.net)

2

Snappy: Fast Compressor/Decompressor (github.com/google)

6

Enlightenment desktop: Terminology 1.14.0 Release (enlightenment.org)

3

Finance worker pays out $25M after video call with deepfake 'chief financ (2024) (cnn.com)

2

Get Answers from EU Institutions (asktheeu.org)

1

38c3: Automated Malfare – discriminatory effects of welfare automation (netcologne.de)

1

38c3: Self Models of Loving Grace by Joshua Bach (ionos.com)

2

Researchers crack Microsoft Azure MFA (oasis.security)

1

Exploring the Potential of Stonebraker's New DBOS (golem.cloud)

2

Perfecting Ransomware on AWS – Using keys to the kingdom to change the locks (medium.com/harsh8v)

1

Investigating Infrastructure and Tactics of Phishing-as-a-Service Platform Snipe (paloaltonetworks.com)

1

Securing our future: September 2024 progress update on Microsoft's Secure Future (microsoft.com)

2

Critical flaw in Nvidia Container Toolkit allows full host takeover (bleepingcomputer.com)

2

The Treasures of Crash Reports (objective-see.org)

1

Sens-Cyber (gouv.fr)

1

Enisa Threat Landscape 2024 (europa.eu)

1

CVE-2024-6104 go-retryablehttp (nist.gov)

2

Forward Secrecy (wikipedia.org)

1

CosmicBeetle joins the ranks of RansomHub affiliates (welivesecurity.com)

1

Disgomoji Malware Used to Target Indian Government (volexity.com)

22

Hyundai Faces New Theft Threat from "Game Boy" Hack (headlight.news)

2

Insecurity Through Censorship: Vulnerabilities Caused by the Great Firewall (assetnote.io)

2

Red.flag.domains (flag.domains)

1

StormBamboo Compromises ISP to Abuse Insecure Software Update Mechanisms (volexity.com)

2

Storm-0501: Ransomware attacks expanding to hybrid cloud environments (microsoft.com)

1

Guide Pratique RGDP [pdf] (cnil.fr)

1

Malware Coordination Using the Blockchain: An Analysis of the Cerber Ransomware (researchgate.net)

1

An introduction to large language models and their relevance for statistical (europa.eu)

1

The not-so-silent type (citizenlab.ca)

2

Honeypots: Focus on CVE-2024-3273 (tehtris.com)

1

Unplugging PlugX: Sinkholing the PlugX USB Worm Botnet (sekoia.io)

2

R language flaw allows code execution via RDS/RDX files (bleepingcomputer.com)

16

JFrog research discovers coordinated attacks on Docker Hub that planted millions (jfrog.com)

1

Red Flag Domains: malicious domain names in French TLDs (flag.domains)

2

Mastodon vulnerability allows attackers to take over accounts (bleepingcomputer.com)

2

Openbao Vault (lfedge.org)

39

Atomic Rocket (projectrho.com)

3

Catch drift outside of your infrastructure code (driftctl.com)

3

Researchers develop 'noise-canceling' qubits to minimize errors in quantum compu (phys.org)

1

Get helpful context with About this image (blog.google)

1

What is low-rank adaptation – LoRA? (bdtechtalks.com)

1

Chien-Shiung Wu (wikipedia.org)

1

Aspect's Experiment (wikipedia.org)

2

OpenJDK 21 Early access builds (java.net)

2

Keepass: 2.54 - fix CVE-2023-3278 (keepass.info)

2

Neuromorphic Engineering (wikipedia.org)

1

Resistive Random Access Memory (wikipedia.org)

2

OWASP Top for Large Language Model Applications (owasp.org)

1

Why and how to hide the Python stack trace (bitecode.dev)

3

Tree Borrows (crans.org)

2

Scala 3.3.0 LTS (scala-lang.org)

52

WebXR (immersiveweb.dev)

3

OpenSSL-Cookbook (feistyduck.com)

1

Skyrmion (wikipedia.org)

26

Indigo: A game engine for functional programmers, in Scala (indigoengine.io)

1

Tyrian: Elm-inspired, purely functional UI library for Scala 3 (indigoengine.io)

1

Govulncheck: Reports vulnerabilities that affect Go code (go.dev)

23

Tooll 3: open-source software to create realtime motion graphics (github.com/still-scene)

4

With ICMP magic, you can snoop on vulnerable HiSilicon, Qualcomm-powered Wi-Fi (theregister.com)

1

Mythologies: XII. Renaissances by Thomas Bangalter (youtube.com)

1

Let’s Diss Those from the Government (univention.com)

1

REvision 2023 (revision-party.net)

2

OctoDNS: Tools for managing DNS across multiple providers (github.com/octodns)

1

SAML Request Signature Verification (Preview) (microsoft.com)

1

Shahnameh: Book of Kings, by the Persian poet Ferdowsi between C. 977-1010 CE (wikipedia.org)

3

H5P: Create, share and reuse interactive HTML5 content in the browser (h5p.org)

2

Chrome: WebAssembly Managed Objects / GC (chromium.org)

2

Ultraviolet: WebGL Shaders in Scala 3 (github.com/purplekingdomgames)

1

Make the Leap Second First-Class: An Open Letter to the International Telecommun (gavinhoward.com)

19

Notepad++ v8.4.9 Release (notepad-plus-plus.org)

1

K9s: Kubernetes CLI to Manage Your Clusters in Style (k9scli.io)

3

Oracle Java Price Hike Could Be an Opportunity for OpenJDK Vendors (itprotoday.com)