Notre Dame, Auburn schedule home-and-home series for 2027-28, schools' first meetings
nytimes.comยท1h
โš™๏ธProgramming
Flag this post
The hybrid cloud setup that made me ditch paid Storage
makeuseof.comยท8h
๐Ÿ”—Crypto
Flag this post
We're Counting Birbs Today
counting-stuff.comยท1hยท
Discuss: Hacker News
โš™๏ธProgramming
Flag this post
Japan Mino Kogyo Ransomware Attack
pbxscience.comยท2hยท
Discuss: Hacker News
๐Ÿ”’Hardware Security
Flag this post
Continuous Architecture: A decade of designing for change
continuousarchitecture.comยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธAI Safety
Flag this post
Iโ€™ve indexed all Strange Loop conference talks so you can use semantic search to find relevant videos
devblogs.shยท4hยท
Discuss: r/programming
โš™๏ธProgramming
Flag this post
Analysis of Beam Misalignment Effect in Inter-Satellite FSO Links
arxiv.orgยท16h
โœ…Formal Verification
Flag this post
Automated Sentiment-Driven Resource Allocation for Community Resilience Planning
dev.toยท1dยท
Discuss: DEV
๐ŸŒDecentralized AI
Flag this post
Designing Data-Intensive Applications [Book Review]-The Big Ideas Behind Reliable, Scalable and Maintainable Systems
dev.toยท5hยท
Discuss: DEV
โœ…Formal Verification
Flag this post
Mission abort strategies for balanced systems with a multi-mode protective device
sciencedirect.comยท5h
๐Ÿ›ก๏ธAI Safety
Flag this post
Automated Cost-Benefit Analysis for Synthetic Biology Gene Synthesis Services
dev.toยท4hยท
Discuss: DEV
๐Ÿ”งMLIR
Flag this post
Cyclic Proofs for iGL via Corecursion
arxiv.orgยท16h
โœ…Formal Verification
Flag this post
Networking in the Standard Library is a terrible idea
reddit.comยท1dยท
Discuss: r/cpp
โš™๏ธProgramming
Flag this post
Multi-Sensor Distributed Hypothesis Testing in the Low-Power Regime
arxiv.orgยท1d
๐ŸงฎHomomorphic Encryption
Flag this post
Robust Control Synthesis via Persistent Homology-Guided Network Pruning
dev.toยท3dยท
Discuss: DEV
๐Ÿ›ก๏ธAI Safety
Flag this post
Uncrossed Multiflows and Applications to Disjoint Paths
arxiv.orgยท1d
๐Ÿ”Zero-Knowledge Proofs
Flag this post
Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime
dev.toยท1dยท
Discuss: DEV
๐Ÿ”’Hardware Security
Flag this post
Generalized Consensus: Addenda
multigres.comยท2d
๐Ÿ“œSmart Contracts
Flag this post
Security Audit of intel ICE Driver for e810 Network Interface Card
arxiv.orgยท16h
๐Ÿ”’Hardware Security
Flag this post