Three ERC Synergy Grants for TU Delft researchers
tudelft.nlยท1d
๐Ÿ”ŒEmbedded Systems
Flag this post
Long-term archiving with ODF: a future-proof strategy
blog.documentfoundation.orgยท4h
๐ŸงLinux
Flag this post
Why Google is really warning 2.5 billion Gmail users to stop using their passwords
fastcompany.comยท48m
๐Ÿ”’security
Flag this post
The apocalypse above our heads
aardvark.co.nzยท18h
๐Ÿ”ŒEmbedded Systems
Flag this post
Microsoft siktar bortom AI โ€“ vill ta fram superintelligens
omni.seยท18h
๐Ÿ”ŒEmbedded Systems
Flag this post
An ESP32 based beaconDB Scanner Prototype
blog.matthewbrunelle.comยท2d
๐Ÿ”ŒEmbedded Systems
Flag this post
Scientists Just Discovered a Quantum Physics Loopholeโ€”And It Could Finally Unlock Interstellar Travel
popularmechanics.comยท14h
๐Ÿ”ŒEmbedded Systems
Flag this post
November 5, 2025
buttondown.comยท1d
๐Ÿ”’security
Flag this post
FinTech Security Testing Costs Simplified: A Practical Breakdown
dev.toยท4hยท
Discuss: DEV
๐Ÿ›ก๏ธCybersecurity
Flag this post
Tea-Fi Redefines DeFi: One SuperApp. Infinite Yield. Powered by $TEA
hackernoon.comยท2d
โšกSystems Programming
Flag this post
How to Map Technical Requirements in IT Project Management
dev.toยท8hยท
Discuss: DEV
๐Ÿ”ŒEmbedded Systems
Flag this post
On the relationship between MESP and 0/1 D-Opt and their upper bounds
arxiv.orgยท6h
๐Ÿ”ŒEmbedded Systems
Flag this post
LUME-DBN: Full Bayesian Learning of DBNs from Incomplete data in Intensive Care
arxiv.orgยท6h
๐Ÿ”ŒEmbedded Systems
Flag this post
Toward fast, containerized, user-space filesystems
lwn.netยท16hยท
Discuss: Hacker News
โšกSystems Programming
Flag this post
ShadowLogic: Backdoors in Any Whitebox LLM
arxiv.orgยท3d
๐Ÿ”’security
Flag this post
Atomically accurate de novo design of antibodies with RFdiffusion
nature.comยท1dยท
Discuss: Hacker News
๐Ÿ”ŒEmbedded Systems
Flag this post
Turn any of your APIs into a Kubernetes-native citizen
dev.toยท23hยท
Discuss: DEV
๐ŸŒNetwork Security
Flag this post
Former cybersecurity employees attempted to extort five U.S. companies in 2023 using BlackCat ransomware attacks
securityaffairs.comยท2d
๐Ÿ›ก๏ธCybersecurity
Flag this post
Redundancy Maximization as a Principle of Associative Memory Learning
arxiv.orgยท2d
๐Ÿ”คc
Flag this post