Kant: Leave people better than you found them
en.wikipedia.orgยท4hยท
Discuss: Hacker News
๐Ÿ”คc
Flag this post
Beyond the current smart grid management systems
edn.comยท1d
๐Ÿ”ŒEmbedded Systems
Flag this post
Note
hsu.cyยท10h
๐Ÿ”คc
Flag this post
The Craft of Science with AI: Evidence, Judgment, and Practice
datasociety.netยท19h
๐Ÿ“ŠSports Analytics
Flag this post
Detecting the topological phase transition in superconductor-semiconductor hybrids by electronic Raman spectroscopy
journals.aps.orgยท1d
๐Ÿ”คc
Flag this post
Build Own Blockchain - 1 episode
notebooklm.google.comยท3dยท
Discuss: DEV
๐ŸงLinux
Flag this post
Building a highly-available web service without a database
screenshotbot.ioยท1dยท
Discuss: r/programming
โšกSystems Programming
Flag this post
Stop foreign-owned apps from harvesting your personal data
foxnews.comยท15h
๐Ÿ”’security
Flag this post
v3.42.0
gitlab.exherbo.orgยท18h
๐Ÿ”’security
Flag this post
Advice for System Design Interviews
jacobbrazeal.wordpress.comยท3hยท
Discuss: Hacker News
๐Ÿ”ŒEmbedded Systems
Flag this post
Digital minimalism is out, digital intentionality is in
lesswrong.comยท12h
๐Ÿ”ŒEmbedded Systems
Flag this post
Cybercriminals break into logistics companies and steal cargo
heise.deยท1d
๐ŸŒNetwork Security
Flag this post
Digital Preservation Steps at the Science Museum Group & Why (We Want To) Preserve
dpconline.orgยท1h
๐Ÿ”ŒEmbedded Systems
Flag this post
From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
dev.toยท1dยท
Discuss: DEV
๐Ÿ”’security
Flag this post
Dublin Airport Data Breach Exposes 3.8 Million Passengers
blogger.comยท22h
๐Ÿ”’security
Flag this post
Automated Prompt Generation for Code Intelligence: An Empirical study and Experience in WeChat
arxiv.orgยท5h
๐Ÿ”งAssembly Language
Flag this post
Two cyber pros became cybercriminals to launch a ransomware campaign
metacurity.comยท1d
๐Ÿ›ก๏ธCybersecurity
Flag this post