22.00.0132 Personal and work systems: how do they interact?
johnnydecimal.com·5h
🏠Personal Archives
Shepherd × Goblins update
spritely.institute·1d
Effect Handlers
Cliodynamics – History as Science
peterturchin.com·7h·
Discuss: Hacker News
📜Digital Philology
Show HN: Historian – bridge from InfluxDB 1.x/2.x to 3.0 with Parquet and DuckDB
cduser.com·15h·
Discuss: Hacker News
🕰️RetroCRDTs
Open-Sourcing Starlark Worker: Define Cadence Workflows with Starlark
uber.com·17h·
Discuss: Hacker News
🌊Stream Processing
Israel just bombed Doha. The Middle East is on the brink of an abyss
the-independent.com·2d
🔍Information Retrieval
The largest supply-chain attack ever…
youtube.com·2d
🔓Open Source Software
US Indicts LockerGoga, MegaCortex, Nefilim Ransomware Admin
decipher.sc·2d
🎫Kerberos Exploitation
Built-in Runtime Security for Containers
blog.qualys.com·2d
📦Container Security
reDB: Go-Powered Open Source Data Mesh for Real-Time DB Interoperability
reddit.com·2d·
Discuss: r/golang
🔀CRDT
AI-powered penetration tool, an attacker's dream, downloaded 10K times in 2 months
theregister.com·14h
🚀Indie Hacking
A Rapid Review Regarding the Concept of Legal Requirements in Requirements Engineering
arxiv.org·3d
🔐Capability Systems
Some input on a UPS
reddit.com·22h·
Discuss: r/homelab
🏠Homelab Preservation
Automated Funnel Phase Attribution via Causal Bayesian Networks and Time-Series Decomposition
dev.to·12h·
Discuss: DEV
📊Feed Optimization
Quantifying Accuracy of an Event-Based Star Tracker via Earth's Rotation
arxiv.org·1d
👁️Observatory Systems
The Hacker’s Library: Uncovering the Best Books
infosecwriteups.com·6d
🔓Hacking
Large Language Model Hacking: Quantifying the Hidden Risks of Using LLMs for Text Annotation
arxiv.org·1d
💻Local LLMs
Dev snared in crypto phishing net, 18 npm packages compromised
theregister.com·3d
💣ZIP Vulnerabilities
Quantifying Moral Trade-offs in Autonomous Vehicle Accident Scenarios via Bayesian Dynamic Programming
dev.to·2d·
Discuss: DEV
🔲Cellular Automata