WhatPulse Maps Your Mac Usage into Beautiful Stats
eshop.macsales.com·22h
💾vintage computing
Transparency: Spanish Supreme Court orders the release of source code
civio.es·2h·
Discuss: Hacker News
⚖️Legal Compliance
21st Century Alchemy
joinef.substack.com·12h·
Discuss: Substack
🔍BitFunnel
Vivaldi 7.6: customize everything and rule your tabs
vivaldi.com·1d·
Discuss: Hacker News
🪟Awesome windows command-line
Show HN: Keplar – Voice AI for qualitative research at quantitative scale
keplar.io·1d·
Discuss: Hacker News
🎙️Whisper
Microsoft, Cloudflare Disrupt RaccoonO365 Phishing Kit Service
decipher.sc·1d
🔓Hacking
Boosting Model Performance with Reinforcement Fine-Tuning
hpc-ai.com·1d·
Discuss: Hacker News
⚔️Lean Tactics
Delegation to AI can increase dishonest behavior
phys.org·1d
🔲Cellular Automata
ClickHouse Helm Chart
reddit.com·10h·
Discuss: r/kubernetes
🗜️LZW Variants
Show HN: Playing Doom Using a Phone Call
github.com·20h·
Discuss: Hacker News
🎮Gameboy Emulation
Cybercriminals pwn 850k+ Americans' healthcare data
theregister.com·22h·
Discuss: Hacker News
🛡Cybersecurity
Most companies admit their current security can't stop AI cybercrime
techradar.com·2h
🔓Hacking
How TestNG Retry Mechanism Saved My Sanity (And My CICD Pipeline)
dev.to·1d·
Discuss: DEV
🛡️Error Boundaries
Efficient Polynomial Identity Testing Over Nonassociative Algebras
arxiv.org·3d
🧮Algebraic Datatypes
What is an AI Trust Framework? Top 3 Pillars of Macaron's Governance Model in 2025
dev.to·1d·
Discuss: DEV
🛡️ARM TrustZone
Dual Actor DDPG for Airborne STAR-RIS Assisted Communications
arxiv.org·1d
⏱️SMPTE Timecode
15th September – Threat Intelligence Report
research.checkpoint.com·4d
🎫Kerberos Exploitation
AI and Deep Learning Accelerators Beyond GPUs: A Practical Overview
dev.to·2d·
Discuss: DEV
🖥️Hardware Architecture
Unified multimodal access layer for Quora’s Poe using Amazon Bedrock
aws.amazon.com·2d
🔌Interface Evolution
Looking to get started with self hosting
reddit.com·2d·
Discuss: r/homelab
🏠HomeLab