109-Year-Old Messages in a Bottle Written by Soldiers Heading to Fight in World War I Discovered on Australian Beach
smithsonianmag.comยท3h
๐Ÿ“œNuremberg Letterbooks
Flag this post
pschatzmann/arduino-audio-tools
github.comยท1d
๐ŸŽ›๏ธCassette DSP
Flag this post
Ranking LLMs based on 180k French votes (French government's AI arena)
comparia.beta.gouv.frยท2dยท
๐Ÿ”Information Retrieval
Flag this post
Apple puts entire App Store on the web โ€“ accidentally leaks code
heise.deยท7h
๐ŸŽApple Archive
Flag this post
The IBM deal that sparked Microsoftโ€™s rise to prominence
techradar.comยท9h
๐ŸŽApple Computing
Flag this post
Free AI and Data Courses with 365 Data Scienceโ€” 100% Unlimited Access until Nov 21
kdnuggets.comยท3h
๐ŸงชData science
Flag this post
Detecting fraudulent North Korean hires: A CISO playbook
news.sophos.comยท1d
๐ŸŽซKerberos Exploitation
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.orgยท3dยท
Discuss: Hacker News
๐ŸŒNetworkProtocols
Flag this post
Stay secure with these VPN and password manager Black Friday bundles
techradar.comยท1d
๐Ÿ”“Password Cracking
Flag this post
Accelerating MySQL Query Optimization via Reinforcement Learning & Hypergraph Analysis
dev.toยท2hยท
Discuss: DEV
๐Ÿ—„๏ธDatabase Internals
Flag this post
Colorectal Cancer Histopathological Grading using Multi-Scale Federated Learning
arxiv.orgยท16h
๐Ÿง Machine Learning
Flag this post
Why preserve? The UKERC Energy Data Centre team contemplatesโ€ฆ
dpconline.orgยท8h
๐ŸŒก๏ธPreservation Physics
Flag this post
Part 2: The Role of No-Code in OSS Modernization
dev.toยท2dยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
Flag this post
A Privacy-First AI Voice Cloning Tool with Local LLMs
dev.toยท1dยท
Discuss: DEV
๐ŸŽ™๏ธWhisper
Flag this post
High-Throughput HPLC Method Optimization via Bayesian Neural Network & Predictive Maintenance
dev.toยท1dยท
Discuss: DEV
๐Ÿ“ŠQuantization
Flag this post
Google: Threat Actors Testing AI During Malware Execution
decipher.scยท1d
๐Ÿฆ Malware Analysis
Flag this post
Fast Answering Pattern-Constrained Reachability Queries with Two-Dimensional Reachability Index
arxiv.orgยท2d
๐ŸŒธBloom Filters
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท6d
๐Ÿ”Hash Functions
Flag this post