Maria-Romina Ivan and Sean Jaffe: The saturation number for the diamond is linear
gilkalai.wordpress.com·2d
💎Information Crystallography
Outdated Tech, Rising Risk: How Federal Agencies Can Eliminate Tech Debt and Reduce Cyber Risk
blog.qualys.com·4d
💾Persistence Strategies
The Air Gap Is an Illusion: Securing AI Data Centers from Wireless Threats
bastille.net·5d
🎫Kerberos History
Migrating to TanStack Start
catalins.tech·1d·
Discuss: Hacker News
🦋Format Metamorphosis
Open-Sourcing Starlark Worker
uber.com·2d·
Discuss: Hacker News
🌊Stream Processing
Rush to get the new Covid booster [it might be withdrawn on September 18]
someweekendreading.blog·1d·
Discuss: Hacker News
📡RSS
The Paradox of Signaling
think-twice.me·2d·
Discuss: Hacker News
🔢Coding Theory
Don't vibe code (any of) your config
augmentedswe.com·1d·
Discuss: Hacker News
🔓Hacking
Myanmar's 'Cyber-Slavery Compounds' May Hold 100,000 Trafficked People
yro.slashdot.org·1d
🛣️BGP Hijacking
This Ouija Business Card Helps You Speak to Tiny Llamas
hackaday.com·5d
Homebrew CPUs
IRC Bots to AI Agents: Automation’s First Playground
brajeshwar.com·2d
🏺Protocol Archaeology
How to Make mspaint Say “Meow”: A Playful Guide to DLL Injection
infosecwriteups.com·1d
🪟Awesome windows command-line
Idle thoughts about how we replace keyboards
interconnected.org·4d·
Discuss: Hacker News
Tactile Computing
HuMo: Human-Centric Video Generation via Collaborative Multi-Modal Conditioning
arxiv.org·4d
🧠Learned Codecs
Algorithmic Optimization of Mycelium-Based Seafood Texture via Bio-Reactive Feedback Loops
dev.to·4d·
Discuss: DEV
🧮Algorithmic Cooking
Akira Ransomware exploits year-old SonicWall flaw with multiple vectors
securityaffairs.com·3d
🔓Hacking
LLM Ensemble for RAG: Role of Context Length in Zero-Shot Question Answering for BioASQ Challenge
arxiv.org·4d
🧮Kolmogorov Complexity
My First MCP Server: Semantic Code Search
dev.to·6h·
Discuss: DEV
Proof Automation