Attackers exploit valid logins in SonicWall SSL VPN compromise
securityaffairs.comยท7h
๐ŸŽซKerberos Exploitation
Vulnerability Management โ€“ Requirements, Scoping & Target Setting
blog.nviso.euยท2d
๐Ÿ”Capability Systems
No Bullshit Guide to Statistics prerelease
minireference.comยท1dยท
Discuss: Hacker News
๐ŸงฎKolmogorov Bounds
Building a VHF / LoRa APRS Bridge | F4FXL
f4fxl.orgยท1d
๐Ÿ“ปHomebrew Protocols
Software worth paying for
seths.blogยท3dยท
Discuss: Hacker News
๐Ÿ’ฟFLAC Archaeology
Eon โ€“ An Effects-Based OCaml Nameserver
ryan.freumh.orgยท13hยท
๐ŸŒDNS Security
Debugging Humidity: Lessons from deploying software in the physical world
physical-ai.ghost.ioยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธError Boundaries
Revisiting Karpathy's 'Unreasonable Effectiveness of Recurrent Neural Networks'
gilesthomas.comยท22hยท
Discuss: Hacker News
๐ŸŽงLearned Audio
State of Opinion โ€“ Programming Languages โ€“ Autumn 2025 Edition
xlii.spaceยท10hยท
Discuss: Hacker News
๐Ÿ”—Concatenative Languages
In-Depth Analysis: "Attention Is All You Need"
dev.toยท1dยท
Discuss: DEV
๐Ÿง Intelligence Compression
Revisiting Mixout: An Overlooked Path to Robust Finetuning
arxiv.orgยท2d
๐Ÿง Learned Codecs
Enhancing Underwater Acoustic Communication via Adaptive Beamforming and Deep Learning Noise Cancellation
dev.toยท1dยท
Discuss: DEV
๐ŸŽงLearned Audio
Can Speech LLMs Think while Listening?
arxiv.orgยท1d
๐ŸŽ™๏ธWhisper
Iomega Storcenter ix4 Nas Failed: 3 drives remain good, one is toast. How to rebuild raid and recover data
reddit.comยท4hยท
Discuss: r/homelab
๐Ÿ› ๏ธGreaseweazle
Automated Fault Isolation & Healing in Linear Control Systems via Multi-Modal Data Fusion & Reinforcement Learning
dev.toยท17hยท
Discuss: DEV
๐Ÿ›ก๏ธError Boundaries
Automated Spectral Fingerprint Deconvolution for Polymer Identification via Deep Oligomer Networks
dev.toยท22hยท
Discuss: DEV
๐ŸŒˆSpectroscopy
How Machine Learning is Reshaping Financial Markets
dev.toยท15hยท
Discuss: DEV
๐Ÿง Machine Learning