Friday 5 December 2025 - 11am
informatics.ed.ac.ukยท5h
๐Decentralized AI
Flag this post
CISO Predictions for 2026
fortinet.comยท1d
๐Hardware Security
Flag this post
Beyond the current smart grid management systems
edn.comยท7h
๐Smart Contracts
Flag this post
Secure Distributed Consensus Estimation under False Data Injection Attacks: A Defense Strategy Based on Partial Channel Coding
arxiv.orgยท1d
๐งฎHomomorphic Encryption
Flag this post
Building Software That Survives โข Michael Nygard & Charles Humble โข GOTO 2025
youtube.comยท2d
๐Smart Contracts
Flag this post
Thoughts on "Static Retrival Revisited"
curiouscoding.nlยท1d
๐งฎHomomorphic Encryption
Flag this post
My self-hosted camera system uses almost no CPU thanks to Frigate
xda-developers.comยท29m
๐Hardware Security
Flag this post
Arista Modular Switches Aim At Scale Across Networks, Hit Scale Out, Too
nextplatform.comยท21h
๐Hardware Security
Flag this post
How Datadog Built a Custom Database to Ingest Billions of Metrics Per Second
blog.bytebytego.comยท22h
๐Hardware Security
Flag this post
Sherlock: Reliable and Efficient Agentic Workflow Execution
arxiv.orgยท1d
๐คAI
Flag this post
Fast Answering Pattern-Constrained Reachability Queries with Two-Dimensional Reachability Index
arxiv.orgยท1d
๐Zero-Knowledge Proofs
Flag this post
Connectivity Structure and Dynamics of Nonlinear Recurrent Neural Networks
journals.aps.orgยท1d
๐งฎHomomorphic Encryption
Flag this post
Why Trust, Not Hype, Defines the Future of Web3 Projects
hackernoon.comยท1d
๐Smart Contracts
Flag this post
Show HN: Polyglot standard library HTTP client C/C++/Rust/Python and benchmarks
โ๏ธProgramming
Flag this post
Improved swarm model with informed agents to prevent stealth attackers based on a vigilance mechanism
sciencedirect.comยท23h
๐ก๏ธAI Safety
Flag this post
Loading...Loading more...