From Hardware Hacker to CTO: Building Teams That Scale โข Meri Williams & Charles Humble
youtube.comยท1d
๐open source
Flag this post
Nintendo Gamecube Controller Protocol
๐open source
Flag this post
Build a Secure Blazor WebAssembly App with ASP.NET Core 10 and JWT Authentication
๐open source
Flag this post
<p>**Abstract:** This paper presents a novel system for automatically generating personalized Cognitive Behavioral Therapy (CBT) treatment protocols for patient...
freederia.comยท1d
๐ขmathematics
Flag this post
Solved the Dropbox Storage Problem: Auto-backup iPhone photos without filling up your Dropbox quota
๐open source
Flag this post
Best infosec-related long reads for the week of 11/8/25
metacurity.comยท21h
๐open source
Flag this post
Google Ads cuts incorrect suspensions by 80% with AI improvements
ppc.landยท1d
๐ขmathematics
Flag this post
๐ ASPICE Literacy โ Episode 10: Suppliers and ASPICE: Trust, Verify, and Collaborate ๐งฉ
๐open source
Flag this post
Storage news ticker โ 13 November
blocksandfiles.comยท2d
๐open source
Flag this post
Quantifying Affine Equivariance for Federated Anomaly Detection in Cognitive Radar Systems
๐ขmathematics
Flag this post
SWORDSTORM: Yeet 88 agents and a complex ecosystem at a problem till it goes away
๐open source
Flag this post
Auth Series: Yet Another Password Authentication Flow.. but hear me out
๐open source
Flag this post
The new age of layered security: from supply chains to endpoints
techradar.comยท2d
๐open source
Flag this post
A few questions about home labbing
๐open source
Flag this post
๐ Deploy Your First CI/CD Website in 10 Minutes Using GitHub Actions + Netlify (Complete Beginner's Guide)
๐open source
Flag this post
Java's Funny Little Heresies
๐ขmathematics
Flag this post
Loading...Loading more...