De Bruijn Numerals
๐ณData Structures
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.comยท15h
๐Durable Objects
Flag this post
Advances In Formal Verification Technology
semiengineering.comยท21h
๐งฎSMT Solvers
Flag this post
PQC in plaintext: How we're helping customers prepare for a quantum-safe future
cloud.google.comยท12h
๐Durable Objects
Flag this post
Three Realisms and The Idea of Sheaves
youtube.comยท15h
๐งฉTypes
Flag this post
AI is a Tool for Economic Progress, Not a Job Taker
hackernoon.comยท23h
๐New AI
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท17h
๐Hardware Security
Flag this post
๐ต For 2,400 years, music has had a mathematical problem: perfect intervals don't add up. The "Pythagorean comma" shows that 12 perfect fifths โ  7 octaves. (3/2)...
threadreaderapp.comยท13h
๐ฏVector Quantization
Flag this post
Hardware to Prove Humanity
๐ก๏ธAnthropic PBC
Flag this post
Vinyl-aza-[3]cumulene intermediates induced polymerization for accessing <i>E</i>-dienyl poly(sulfonylamidines) towards pH-responsive drug delivery
nature.comยท13h
๐ฌMaillard Reaction
Flag this post
A faster way to find new medicinesโwithout the limitations of big DNA barcodes
phys.orgยท12h
๐ฅฉAlternative Proteins
Flag this post
Regex for SEO: The simple language that powers AI and data analysis
searchengineland.comยท16h
๐RegEx Engines
Flag this post
Age Verification, Estimation, Assurance, Oh My! A Guide to the Terminology
eff.orgยท5h
๐Hardware Security
Flag this post
Mind of a Mathematician (2019)
๐งฎSMT Solvers
Flag this post
Researchers advance cross-modality smart security with transformer model
techxplore.comยท2h
๐Hybrid Search
Flag this post
Batteries are crucial technology for the 21st century
ft.comยท10h
๐Technology Supply Chains
Flag this post
Show HN: Ellipticc Drive โ open-source cloud drive with E2E and PQ encryption
๐ Self-hosting
Flag this post
Loading...Loading more...