The Heat Is On
hackster.ioยท9h
๐Ÿ”“open source
Flag this post
I'm starting to think this is the key to everything
i.redd.itยท9hยท
Discuss: r/godot
๐Ÿ”ขmathematics
Flag this post
Tor HSDir Election: Consensus Weight Calculation and Directory Authority Coordination
sambent.comยท7h
๐Ÿ”“open source
Flag this post
BigQuery under the hood: How Google brought embeddings to analytics
cloud.google.comยท7h
๐Ÿณcooking
Flag this post
Googleโ€™s Latest Security Push Marks the Slow Death of Passwords
techrepublic.comยท12h
๐Ÿ”ขmathematics
Flag this post
How a ransomware gang encrypted Nevada government's systems
bleepingcomputer.comยท1h
๐Ÿ”“open source
Flag this post
Hardware Wallets Surge as Cryptoโ€™s Unyielding Shield Against Cyber Threats
kttc.marketminute.comยท1d
๐Ÿ”“open source
Flag this post
Apple's LLM Breakthrough
xray.greyb.comยท11hยท
Discuss: Hacker News
๐Ÿณcooking
Flag this post
The Underwear Fixed Point
notes.hella.cheapยท1dยท
๐Ÿ”“open source
Flag this post
Kawaiicon 3 - Day 2
rodger.donaldson.gen.nzยท3d
๐Ÿ”“open source
Flag this post
A Photomicrographic Dataset of Rocks for the Accurate Classification of Minerals
nature.comยท10h
๐Ÿ”“open source
Flag this post
Programming principles for self taught front-end developers
piccalil.liยท12hยท
Discuss: Hacker News
๐Ÿ”“open source
Flag this post
6 Ways Phishing Scammers Imitate Real People and Brands
howtogeek.comยท1d
๐Ÿ”“open source
Flag this post
Mastering Python Strings: A Deep Dive for Senior Developers
dev.toยท1dยท
Discuss: DEV
๐Ÿ”ขmathematics
Flag this post
Microsoft 365 users targeted by major new phishing operation - here's how to stay safe
techradar.comยท4h
๐Ÿ”“open source
Flag this post
IT Asset Management-Vulnerabilities and Patches.
dev.toยท1hยท
Discuss: DEV
๐Ÿ”“open source
Flag this post
Unclonable Cryptography in Linear Quantum Memory
arxiv.orgยท4d
๐Ÿ”“open source
Flag this post
Wdyt about my server setup?
reddit.comยท9hยท
Discuss: r/selfhosted
๐Ÿ”“open source
Flag this post
SWAP: Towards Copyright Auditing of Soft Prompts via Sequential Watermarking
arxiv.orgยท1d
๐Ÿ”“open source
Flag this post
How clause-level constraints turn training choices into verifiable policies for generative systems
dev.toยท10hยท
Discuss: DEV
๐Ÿ”“open source
Flag this post