A Fantastic Sol 20 Resource (sol20.org)
sol20.org·1d
🧲RISC-V Archaeology
Flag this post
Show HN: I built AI twins from LinkedIn and CRM data to simulate real B2B buyers
resonax.ai·53m·
Discuss: Hacker News
🎛️Feed Filtering
Flag this post
Valuable News – 2025/11/03
vermaden.wordpress.com·2d
🔌Operating system internals
Flag this post
Using FreeBSD to make self-hosting fun again
jsteuernagel.de·3d·
🐡OpenBSD
Flag this post
Deploying Temporal on AWS ECS with Terraform
papnori.github.io·8h·
Discuss: Hacker News
🤝Consensus Protocols
Flag this post
The Hackers Manifesto (The Conscience of a Hacker) (1986)
phrack.org·6h·
Discuss: Hacker News
🔓Hacking
Flag this post
Why stop at 1 million tokens when you can have 10? My journey to extreme context on a gaming GPU. [P]
reddit.com·1d·
Homebrew CPUs
Flag this post
Measuring the Intrinsic Dimension of Earth Representations
arxiv.org·9h
🧠Machine Learning
Flag this post
A Deep Dive into Multi-Transport Protocol Abstraction in Python
dev.to·23h·
Discuss: DEV
🌐NetworkProtocols
Flag this post
Carol Brooks, Cyber Psychologist, Platinum 3P
forensicfocus.com·1d
🎯Threat Hunting
Flag this post
Matrix Phylogeny: Compact Spectral Fingerprints for Trap-Robust Preconditioner Selection
arxiv.org·1d
🌊Spectral Clustering
Flag this post
Identifying Linux Kernel Instability Due to Poor RCU Synchronization
arxiv.org·1d
🔍eBPF
Flag this post
Predictive Orbital Debris Remediation via Multi-Sensor Bayesian Fusion & Reinforcement Learning
dev.to·23h·
Discuss: DEV
🎯Threat Hunting
Flag this post
Optimizing Multi-UAV 3D Deployment for Energy-Efficient Sensing over Uneven Terrains
arxiv.org·9h
Information Bottleneck
Flag this post
🔥 My Business Was Stealing My Soul (Until This $0 Secret Gave Me My Life Back) 🔥
dev.to·22h·
Discuss: DEV
🚀Indie Hacking
Flag this post
How AI is helping us monitor and support vulnerable ecosystems
phys.org·1d
🧠Machine Learning
Flag this post
Redundancy Maximization as a Principle of Associative Memory Learning
arxiv.org·9h
🧠Machine Learning
Flag this post
A Hybrid Deep Learning and Forensic Approach for Robust Deepfake Detection
arxiv.org·2d
🔍Vector Forensics
Flag this post
🛡️ Fortify - AI-Powered Security Analysis Platform
dev.to·1d·
Discuss: DEV
Proof Automation
Flag this post
Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users
darkreading.com·12h
🔓Hacking
Flag this post