A new way of searching Sands & Mac
updates.timsherratt.orgยท3h
๐ชEuropean data sovereignty
Flag this post
Docker Desktop 4.50: Indispensable for Daily Development
docker.comยท1h
๐ self hosting
Flag this post
A dual strategy: legal action and new legislation to fight scammers
blog.googleยท5h
๐ชEuropean data sovereignty
Flag this post
Taking off the Mask: Forensic Analysis of Google Voice
blogs.dsu.eduยท1d
๐ชEuropean data sovereignty
Flag this post
Avast Brings AI-powered Scam Defense to Mobile
prnewswire.comยท9h
๐ชEuropean data sovereignty
Flag this post
Whisper it - Microsoft uncovers sneaky new attack targeting top LLMs to gain access to encrypted traffic
techradar.comยท19h
๐ชEuropean data sovereignty
Flag this post
Condensation
lesswrong.comยท2d
๐opende source
Flag this post
Forwarding packets at scale - Building a Cloud Data Plane using eBPF/XDP (denog17)
cdn.media.ccc.deยท1d
๐ self hosting
Flag this post
LLM Output Drift: Cross-Provider Validation & Mitigation for Financial Workflows
arxiv.orgยท10h
๐ชEuropean data sovereignty
Flag this post
Enhanced Land Value Capture Optimization via Multi-Modal Data Fusion and Predictive Analytics
๐ชEuropean data sovereignty
Flag this post
I Built an API-First Document Workflow Engine (Looking for Feedback)
๐ชEuropean data sovereignty
Flag this post
Powering enterprise search with the Cohere Embed 4 multimodal embeddings model in Amazon Bedrock
aws.amazon.comยท18h
๐ self hosting
Flag this post
Coherence Mechanisms for Provable Self-Improvement
arxiv.orgยท10h
๐ self hosting
Flag this post
Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power
๐opende source
Flag this post
โก Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More
thehackernews.comยท2d
๐ชEuropean data sovereignty
Flag this post
Loading...Loading more...