Migrating from Open Policy Agent to Amazon Verified Permissions
aws.amazon.comยท21h
๐งLinux
Flag this post
Online password manager class-action: What Canadians need to know about proposed $4.1M settlement
theifp.caยท21h
๐security
Flag this post
GSOC 2025 - Converting Demucs v4 (Hybrid Transformer) AI model to ONNX format
mixxx.orgยท32m
๐Embedded Systems
Flag this post
How an Attacker Drained $128M from Balancer Through Rounding Error Exploitation
research.checkpoint.comยท1d
๐security
Flag this post
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.comยท1d
๐security
Flag this post
The Pentagonโs fiber future: How DoD networks race to meet new demands
breakingdefense.comยท20h
๐Network Security
Flag this post
Bacula For Dummies
blog.feld.meยท16h
๐งLinux
Flag this post
World Digital Preservation Day
digitalpreservation.noยท16h
๐งLinux
Flag this post
Must-See Recordings Now Available
opensource.orgยท2h
๐งLinux
Flag this post
Scientists reveal it is feasible to send quantum signals from Earth to a satellite
phys.orgยท23h
๐Embedded Systems
Flag this post
Welcome to r/P4lang โ a community dedicated to the P4 programming language, designed for programming packet processors and software-defined networks.
๐Embedded Systems
Flag this post
Real-world chemistry lab image dataset for equipment recognition across 25 apparatus categories
nature.comยท1d
๐Network Security
Flag this post
What is SimHash?
๐security
Flag this post
Q-Sat AI: Machine Learning-Based Decision Support for Data Saturation in Qualitative Studies
arxiv.orgยท1d
๐Sports Analytics
Flag this post
EQ-Negotiator: Dynamic Emotional Personas Empower Small Language Models for Edge-Deployable Credit Negotiation
arxiv.orgยท11h
๐Embedded Systems
Flag this post
GDM: Consistency Training Helps Limit Sycophancy and Jailbreaks in Gemini 2.5 Flash
lesswrong.comยท2d
๐Embedded Systems
Flag this post
SORTeD Rashomon Sets of Sparse Decision Trees: Anytime Enumeration
arxiv.orgยท11h
๐Embedded Systems
Flag this post
Bipartite entanglement and surface criticality: The extra contribution of non-ordinary edge in entanglement
arxiv.orgยท1d
๐ก๏ธCybersecurity
Flag this post
Loading...Loading more...