Inside the bloody work of tracking war crimes from space
telegraph.co.ukΒ·2d
πŸ”’CyberSecurity
Flag this post
Manager for BPS bus operator charged with extortion in kickback scheme; one vendor also arrested
universalhub.comΒ·3h
πŸ”’CyberSecurity
Flag this post
How Windows Recall Worksβ€”and Whether You Should Switch It On
wired.comΒ·7h
⚑Systems Programming
Flag this post
Brain Cleaning in Progress...
psychologytoday.comΒ·3h
πŸ”’CyberSecurity
Flag this post
Communication breakdown
ft.comΒ·1h
πŸ”’CyberSecurity
Flag this post
It was MTU! Zscaler over GRE behind Palo, blocking ICMP Frag Needed
weberblog.netΒ·1d
πŸ”’CyberSecurity
Flag this post
How we measure: IPv6
blog.apnic.netΒ·19h
πŸ”„Legacy Migration
Flag this post
India-Pakistan conflict risks surge amid terror attacks, Afghan proxy war claims
scmp.comΒ·11hΒ·
Discuss: r/SCMPauto
πŸ”’CyberSecurity
Flag this post
AI-Accelerated Agile Hardware Design Using the ROHD Framework
intel.github.ioΒ·2dΒ·
Discuss: Hacker News
⚑Systems Programming
Flag this post
Man accused of terror plot on Windsor Castle soldiers admits buying cache of knives and testing chemicals for a bomb
dailymail.co.ukΒ·5h
πŸ¦€Rust
Flag this post
BBC bias? The Prescott memo falls well short of the standards of impartiality it demands
theconversation.comΒ·5h
πŸ”’CyberSecurity
Flag this post
Russian attack on Kyiv leaves 6 dead, 35 injured -PHOTO-UPDATED-2
en.apa.azΒ·7h
πŸ”’CyberSecurity
Flag this post
[LIVE THREAD πŸ”΄βšͺοΈπŸ”΅]
threadreaderapp.comΒ·11h
πŸ”’CyberSecurity
Flag this post
Qumulo Introduces New Tools to Help Enterprises Get More Value Out of Their Data
storagereview.comΒ·1h
πŸ”„Legacy Migration
Flag this post
Inside Harvey: How a first-year legal associate built one of Silicon Valley’s hottest startups
techcrunch.comΒ·7h
πŸ”„Legacy Migration
Flag this post
The Data Within
psychologytoday.comΒ·3h
πŸ”’CyberSecurity
Flag this post
Police in Paris wound knife-wielding man at Montparnasse train station
seattletimes.comΒ·3h
πŸ¦€Rust
Flag this post
Data Governance Made Simple: How to Protect and Control Your Data Assets
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”„Legacy Migration
Flag this post
Automated Anomaly Detection in Digital Pathology Slides via Multi-Scale Graph Analysis
dev.toΒ·9hΒ·
Discuss: DEV
πŸ”’CyberSecurity
Flag this post