Are Your Employees Putting Your Enterprise at Risk This Holiday Season?
zimperium.comยท2h
๐Ÿ”ขmathematics
Flag this post
Android developer verification: Early access starts now as we continue to build with your feedback
android-developers.googleblog.comยท16hยท
๐Ÿ”“open source
Flag this post
This Eurorack "Brain" Module Makes Learning Audible as it Puts Artificial Intelligence in Your Synth
hackster.ioยท1d
๐Ÿ”“open source
Flag this post
DSP Study Group - Reading audio data from WAV-files
clojurecivitas.github.ioยท16h
๐Ÿ”“open source
Flag this post
Donโ€™t Be a Louvre: How Weak Passwords and Unpatched Software Encourage Breaches
blog.elcomsoft.comยท3d
๐Ÿ”“open source
Flag this post
InventHelp Inventor Develops Improved Graded Sports Card Case (RKH-895)
prnewswire.comยท28m
๐Ÿ”ขmathematics
Flag this post
Instrumentation Observability for LLM Apps
groundcover.comยท6hยท
Discuss: r/LLM
๐Ÿ”“open source
Flag this post
The common social media security measure that creates a treasure trove for hackers
the-independent.comยท1d
๐Ÿ”ขmathematics
Flag this post
How do you self-host your own privacy tools to keep data out of third-party hands? Begineer friendly advice please
reddit.comยท1dยท
Discuss: r/selfhosted
๐Ÿ”“open source
Flag this post
Foolproof AI: Guaranteeing Plan Execution Before Deployment
dev.toยท3hยท
Discuss: DEV
๐Ÿ”“open source
Flag this post
Professor Predicts Salesforce Will Be First Big Tech Company Destroyed by AI
blogger.comยท3h
๐Ÿ”“open source
Flag this post
Lorxus Does Halfhaven: 11/01~11/07
lesswrong.comยท23h
๐Ÿ”ขmathematics
Flag this post
Production-Ready AI Agents: 8 Patterns That Actually Work (with Real Examples from Bank of Americaโ€ฆ
pub.towardsai.netยท3h
๐Ÿ”“open source
Flag this post
Predictive Maintenance of Dust Collection Systems via Acoustic Emission Analysis & Machine Learning
dev.toยท1dยท
Discuss: DEV
๐Ÿ”“open source
Flag this post
Building a Simple Personal Library with Python: My Experience from Zero to Execution
dev.toยท2hยท
Discuss: DEV
๐Ÿ”“open source
Flag this post
The Identity Shift: Why IAM is Becoming the Heart of Enterprise Security
dev.toยท22hยท
Discuss: DEV
๐Ÿ”ขmathematics
Flag this post
Firms in Japan at Risk of Ransomware Threats, Government Measures Insufficient
blogger.comยท2h
๐Ÿ”“open source
Flag this post
BUILDING A BIGRAM LANGUAGE MODEL
dev.toยท4hยท
Discuss: DEV
๐Ÿ”ขmathematics
Flag this post