Metamaterials-Inspired Software Engineering
economyoftime.netΒ·2hΒ·
Discuss: Hacker News
πŸ”’Computer Security
Flag this post
What do noise functions sound like?
aabiji.github.ioΒ·2dΒ·
πŸ”’Computer Security
Flag this post
Aeruta
taniyn.questΒ·3d
πŸ”’Computer Security
Flag this post
Women prefer to be prettier than a partner, but men want to be funnier
newscientist.comΒ·4h
πŸ”’Computer Security
Flag this post
Would you still love me if I was a worm?
smallpotatoes.paulbloom.netΒ·1d
πŸ”’Computer Security
Flag this post
Doing the Vimovember
lazybea.rsΒ·13h
πŸ”’Computer Security
Flag this post
Israeli attacks on Gaza despite ceasefire follow Lebanon pattern
aljazeera.comΒ·21h
β›΅Boating
Flag this post
Why Video Tutorials Are Holding You Back (And What to Do About It)
ludonauta.itch.ioΒ·41m
πŸ”’Computer Security
Flag this post
Trump says he has an β€˜obligation’ to sue BBC over edited speech
ft.comΒ·7h
πŸ”’Computer Security
Flag this post
Waldium
producthunt.comΒ·15h
πŸ”’Computer Security
Flag this post
Resurrection-As-A-Service? Inside The Coming AI Afterlife Boom
forbes.comΒ·2h
πŸ”’Computer Security
Flag this post
Micah Parsons trade came with 'poison pill' blocking potential deals to NFC East: Source
nytimes.comΒ·2d
πŸ”’Computer Security
Flag this post
Toward the Frontiers of Reliable Diffusion Sampling via Adversarial Sinkhorn Attention Guidance
arxiv.orgΒ·11h
πŸ”’Computer Security
Flag this post
How Bills are punishing defenses with this offensive formation: Watch video
nytimes.comΒ·4d
πŸ”’Computer Security
Flag this post
ROAR: Robust Accident Recognition and Anticipation for Autonomous Driving
arxiv.orgΒ·1d
πŸ”’Computer Security
Flag this post
Seeds of Nico Harrison's demise sowed even before he traded Luka DončiΔ‡
nytimes.comΒ·19h
πŸ”’Computer Security
Flag this post
Coherence Mechanisms for Provable Self-Improvement
arxiv.orgΒ·11h
πŸ”’Computer Security
Flag this post