Google Drive search is underrated โ here's how I use it like a pro
androidpolice.comยท1h
๐Cybersecurity
Flag this post
Level up your Solidity LLM tooling with Slither-MCP
blog.trailofbits.comยท1h
๐ฅSelfhosting
Flag this post
Drake: Model-Based Design and Verification for Robotics
drake.mit.eduยท3d
๐ฅSelfhosting
Flag this post
From a CTO at a startup:
๐ฅSelfhosting
Flag this post
I went to an AI prompt battle, and it was as bad as you think
creativebloq.comยท1h
๐Cybersecurity
Flag this post
Build bridges, not walls
bitfieldconsulting.comยท1d
๐Cybersecurity
Flag this post
ๆ ๆ็ๆงไนๆฐธไธๆพๅผ็ฌฌ14้ : CCTV1 : November 15, 2025 10:14am-11:06am CST
archive.orgยท11h
๐Cybersecurity
Flag this post
Made a Dynamic HDD Fan Curve Controller for Unraid (With Optional WhatsApp Alerts)
๐ฅSelfhosting
Flag this post
LogSentinel (Rust) โ High-Performance Rule Engine for Real-Time Log Threat Detection
๐Cybersecurity
Flag this post
How To Safely Purchase Github Accounts
๐Cybersecurity
Flag this post
Official /r/rust "Who's Hiring" thread for job-seekers and job-offerers [Rust 1.91]
๐ฅSelfhosting
Flag this post
Critical Vulnerability in v380 Cameras: How Plaintext Credentials Exposed Millions of Devices
๐Cybersecurity
Flag this post
CoCo-MILP: Inter-Variable Contrastive and Intra-Constraint Competitive MILP Solution Prediction
arxiv.orgยท2d
๐Cybersecurity
Flag this post
AI Annotation Orchestration: Evaluating LLM verifiers to Improve the Quality of LLM Annotations in Learning Analytics
arxiv.orgยท1d
๐Cybersecurity
Flag this post
Enhanced Life Cycle Integration via Predictive Asset Degradation Modeling & Digital Twin Optimization
๐Cybersecurity
Flag this post
Loading...Loading more...