How To Make Emotionally Intelligent Friendships: 7 Secrets From Research
bakadesuyo.com·11h
🧠Personal Knowledge Base
Upcoming Talks at PGConf.EU and PyCon Sweden
tselai.com·1d
🗃️Nordic Databases
Facebook Begins Sending Settlement Payments from Cambridge Analytica Scandal Soon
tech.slashdot.org·15h
📥Feed Aggregation
America is Still Working (2024)
fusionaier.org·1d·
Discuss: Hacker News
🔲Cellular Automata
Utah governor says the motive in Kirk shooting is not yet certain but the suspect was on the left
apnews.com·11h·
Discuss: Hacker News
🛡Cybersecurity
Letters: Front-page story didn’t capture full measure of Charlie Kirk
mercurynews.com·2d
🏠Personal Archives
FACT FOCUS: Assassination of Charlie Kirk prompts flood of false and misleading claims online
the-independent.com·1d
📰RSS Archaeology
Mini microscope enables real-time 3D brain imaging in freely moving mice
phys.org·1d
🌈Holographic Archives
Phospholipid head govern area per lipid and emergent elasticity of bilayer(2018)
cell.com·4d·
Discuss: Hacker News
🔲Cellular Automata
How To Work With Local AI in the Zed IDE
thenewstack.io·4d
🦀Rust Macros
ReactJS: The Frontend Library That Changed the Web
dev.to·21h·
Discuss: DEV
🧩WASM Components
Row Equivalence in Linear Algebra with Python
dev.to·5d·
Discuss: DEV
📐Linear Algebra
FC-PINO: High Precision Physics-Informed Neural Operators via Fourier Continuation
arxiv.org·6d
🕸️Tensor Networks
What I Wanted, What I Got
newyorker.com·16h·
Discuss: r/longform
📼Cassette Culture
The End-to-End Data Scientist’s Prompt Playbook
towardsdatascience.com·6d
Proof Automation
MeanFlow-Accelerated Multimodal Video-to-Audio Synthesis via One-Step Generation
arxiv.org·5d
🎧Learned Audio
Quantifying Moral Trade-offs in Autonomous Vehicle Accident Scenarios via Bayesian Dynamic Programming
dev.to·4d·
Discuss: DEV
🔲Cellular Automata
Real-Time Glacier Ice Core Anomaly Detection via Deep Variational Autoencoder and Statistical Ensemble Forecasting
dev.to·5d·
Discuss: DEV
🔍Vector Forensics
ELA-1515-1 imagemagick security update
freexian.com·1d
💣ZIP Vulnerabilities