Show HN: Anonymous Peer to Peer Therapy
apps.apple.comยท19hยท
Discuss: Hacker News
๐Ÿ“นWebRTC
Flag this post
Where do I even begin with system design, where do I even start ?
reddit.comยท8hยท
Discuss: r/node
๐Ÿ—๏ธSystem Design
Flag this post
The Next Frontier: Digital Assets Beyond Bitcoin and Stablecoins
kttc.marketminute.comยท1d
โ›“๏ธBlockchain
Flag this post
The Role of a Web3 Development Company
dev.toยท13hยท
Discuss: DEV
โ›“๏ธBlockchain
Flag this post
Application of Blockchain Frameworks for Decentralized Identity and Access Management of IoT Devices
arxiv.orgยท1d
โ›“๏ธBlockchain
Flag this post
Mathematics solves problems by pen and paper. CS helps us to go far beyond that
cacm.acm.orgยท3dยท
Discuss: Hacker News
๐Ÿ”ขHomomorphic Encryption
Flag this post
Quantum-Resistant Federated Learning: Implementing Post-Quantum Cryptography in Cross-Silo Model Aggregation
dev.toยท2dยท
Discuss: DEV
๐Ÿ”ขHomomorphic Encryption
Flag this post
A PoC to make a backdoored PyTorch neural network
hacktelligence.orgยท38mยท
Discuss: Hacker News
๐Ÿ”ฅPyTorch
Flag this post
Energy Loss Functions for Physical Systems
arxiv.orgยท18h
๐Ÿ“Linear Algebra
Flag this post
Topographical sparse mapping: A training framework for deep learning models
sciencedirect.comยท1dยท
Discuss: Hacker News
๐Ÿ‘๏ธComputer Vision
Flag this post
Part 4: Daily Security Habits
open.forem.comยท2dยท
Discuss: DEV
๐Ÿ”’Security
Flag this post
Cloud Computing Overview: Migrate, Secure, Scale โ€” AD Infosystem
adinfosystem.comยท13hยท
Discuss: DEV
โ˜๏ธCloud Computing
Flag this post
The Quantum Threat Nobody's Taking Seriously (But Should)
myitbasics.comยท3dยท
Discuss: DEV
๐Ÿ”’Security
Flag this post
How does HTTP work?
corero.comยท20hยท
Discuss: DEV
๐ŸŒNetwork Protocols
Flag this post
Using XDP for Egress Traffic
loopholelabs.ioยท6hยท
๐Ÿ”eBPF
Flag this post
Low-Level Hacks
blog.raycursive.comยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
IoMT Vulnerabilities Putting Patient Health Data at Risk
hackernoon.comยท2d
๐Ÿ”’Security
Flag this post
Enhanced Dielectric Performance of Aircraft HV Power Cables via Nanocomposite Crosslinking Optimization
dev.toยท6hยท
Discuss: DEV
๐Ÿ—๏ธSystem Design
Flag this post
Cyber experts warn of the 'catastrophic' threat quantum computing could pose
9news.com.auยท1dยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Flag this post
Developing desktop apps from scratch: A feature checklist
alek-tron.comยท2hยท
Discuss: Hacker News
๐Ÿ“File Systems
Flag this post