Skeleton with brutal injuries identified as duke assassinated in 1272
newscientist.com·1h
📜Medieval Computing
Flag this post
The Art of the Command Line
jxself.org·11h
📟CLI Design
Flag this post
5 ways to strengthen your firewall and endpoint’s defenses against ransomware
news.sophos.com·14h
🌐DNS over QUIC
Flag this post
The 1994 IBM PC Invoice
brainbaking.com·2h
🇳🇱Dutch Computing
Flag this post
Building a better testing experience for Workflows, our durable execution engine for multi-step applications
blog.cloudflare.com·1d
🔄Reproducible Builds
Flag this post
Weekly Bookmarks
inkdroid.org·3d
🏠Homelab Archaeology
Flag this post
27 October 2025 – Inspiring Beginnings: Collaboration, Heritage, and Global Action at ICA Barcelona 2025
ica.org·13h
🏛️PREMIS
Flag this post
urbanadventurer/Android-PIN-Bruteforce
github.com·7h
🔓Password Cracking
Flag this post
Naïve Shuffle Algorithm (2007)
🌊Streaming Algorithms
Flag this post
Beware of double agents: How AI can fortify — or fracture — your cybersecurity
blogs.microsoft.com·19h
🔐Capability Systems
Flag this post
Continuous cell-type diversification in mouse visual cortex development
nature.com·16h
🕸️Algebraic Topology
Flag this post
RAM: Memory prices skyrocket
heise.de·13h
🇳🇱Dutch Computing
Flag this post
Ehxb | Path Traversal Vulnerabilities
infosecwriteups.com·3d
💣ZIP Vulnerabilities
Flag this post
BRAINS: A Retrieval-Augmented System for Alzheimer's Detection and Monitoring
arxiv.org·1d
🧮Z3 Applications
Flag this post
MemSearcher: Training LLMs to Reason, Search and Manage Memory via End-to-End Reinforcement Learning
arxiv.org·1d
🔲Cellular Automata
Flag this post
Large language models require a new form of oversight: capability-based monitoring
arxiv.org·4h
✨Effect Handlers
Flag this post
Loading...Loading more...