mathematics of the impossible: Revision. Feedback welcome especially on chapters 1,2,3
emanueleviola.wordpress.com·14h
🎞️Tape Combinatorics
Deselection Deep Dive: University of Wyoming’s Experience with the WEST Internet Archive Pilot
cdlib.org·2d
🔄Archival Workflows
Using an LLM on the Advent of Code
funcall.blogspot.com·2d·
⚔️Lean Tactics
Sex offenders, terrorists, drug dealers, exposed in spyware breach
malwarebytes.com·2d
🔓Hacking
Canadian Bacon Cybersecurity: SharePoint Vulnerabilities and Vulnerabilities in General
blogs.cisco.com·15h
🛡Cybersecurity
On GitHub: Numerous fakes of well-known Mac apps are circulating
heise.de·1d
🍎Apple Archive
Implementing /Usr Merge in Alpine
alpinelinux.org·7h·
Discuss: Hacker News
🔓Open Source Software
Bcachefs removed from the mainline kernel
lwn.net·1d·
🔌Operating system internals
IBM App Connect Enterprise Toolkit can leak data
heise.de·1d
💣ZIP Vulnerabilities
CI Validation for argocd PR/SCM Generators
reddit.com·1d·
Discuss: r/kubernetes
Archive Validation
Lost Techniques: Bond-out CPUs and In Circuit Emulation
hackaday.com·10h
🕹️Hardware Emulation
Show HN: Assemble Labs – Hardware Brain for LLMs/IDEs
news.ycombinator.com·5h·
Discuss: Hacker News
Homebrew CPUs
CI/CD for AI: Running Evals on Every Commit
focused.io·2d·
Discuss: Hacker News
🔍Concolic Testing
Top 21.1 Sites to B(uy) Old Gmail Accounts In (PVA & Aged)
dev.to·2d·
Discuss: DEV
🔍BitFunnel
Automated Excipient Polymorphism Prediction via Multi-Modal Data Fusion and HyperScore Validation
dev.to·1d·
Discuss: DEV
🧮Algebraic Datatypes
5 AI Extensions to Help Improve Your VS Code Experience
thenewstack.io·10h
🔄Language Evolution
Inside the Unified Log 3: Log storage and attrition
eclecticlight.co·2d
💾Persistence Strategies
The Dark Art of Financial Disguise in Web3: Money Laundering Schemes and Countermeasures
arxiv.org·2d
🕵️Vector Smuggling
Dotenv files annoyed me into writing Polyenv
dev.to·3d·
Discuss: DEV
🛡️CLI Security
LEMs: A Primer On Large Execution Models
arxiv.org·23h
🧠Machine Learning