2B email addresses and 1.3B passwords compromised in multiple data breaches
9to5mac.comΒ·1d
π³cooking
Flag this post
A Brief Perspective on Piezotronic and Thermoelectric Coupling: Flexible Platforms for Synergistic Energy Scavenging and Peltier-Caloric Effects
arxiv.orgΒ·23h
π³cooking
Flag this post
The AI use case doom loop
πopen source
Flag this post
AI agents, real results: from assistants to orchestrators in the enterprise
theregister.comΒ·19h
πopen source
Flag this post
3 open-source, cross-platform security apps that just work
howtogeek.comΒ·1d
πopen source
Flag this post
Your weekly reading from Web Directions
webdirections.orgΒ·1d
πopen source
Flag this post
DeepSeek-OCR: Turning Text into Images for Smarter AI
pub.towardsai.netΒ·23h
πopen source
Flag this post
Quantum roundup: Lots of companies announcing new tech
arstechnica.comΒ·2d
πopen source
Flag this post
Police take down three cybercrime operations in latest round of βwhack-a-moleβ
techcrunch.comΒ·1d
πopen source
Flag this post
A comparative analysis of metamodels for 0D cardiovascular models, and pipeline for sensitivity analysis, parameter estimation, and uncertainty quantification
arxiv.orgΒ·23h
π’mathematics
Flag this post
CLIP4VI-ReID: Learning Modality-shared Representations via CLIP Semantic Bridge for Visible-Infrared Person Re-identification
arxiv.orgΒ·23h
πopen source
Flag this post
Omnidirectional type inference for ML: principality any way
arxiv.orgΒ·23h
π’mathematics
Flag this post
Security Researchers at Proton Warn of Massive Credential Exposure
blogger.comΒ·3d
πopen source
Flag this post
How credentials get stolen in seconds, even with a script-kiddie-level phish
malwarebytes.comΒ·3d
πopen source
Flag this post
FedeCouple: Fine-Grained Balancing of Global-Generalization and Local-Adaptability in Federated Learning
arxiv.orgΒ·23h
πopen source
Flag this post
Why itβs time to build dumb applications
nordot.appΒ·1d
πopen source
Flag this post
Loading...Loading more...