The cinch
maryrosecook.com·1d
Proof Automation
Flag this post
SonicWall SSLVPN devices compromised using valid credentials
cybersecuritydive.com·1d
🔓Hacking
Flag this post
Version 2 of the Algol 68 GCC Front-End posted
gcc.gnu.org·2d
🦀Rust Macros
Flag this post
‘Halo Fund Announces Strategic Secondary Investment in 1Password’
businesswire.com·6h·
Discuss: Hacker News
🔍BitFunnel
Flag this post
FTL Quantum Communication: Rethinking the No-Communication Theorem
altpropulsion.com·2d·
Discuss: Hacker News
⚛️Quantum Channels
Flag this post
Mamba-3: Improved Sequence Modeling Using State Space Principles
openreview.net·1d·
Discuss: Hacker News
💻Local LLMs
Flag this post
The Worst Bug In Games Is Now Gone Forever
youtube.com·4h
🔲Cellular Automata
Flag this post
To panic or not to panic
ncameron.org·23h·
🔒Type Safety
Flag this post
Breach of F5 requires “emergency action” from BIG-IP users, feds warn
arstechnica.com·14m
🔓Hacking
Flag this post
New indicators developed to detect loneliness risk in remote work
phys.org·25m
📚Digital Humanities
Flag this post
Study: Live facial recognition by police only possible unlawfully
heise.de·8h
🔐Homomorphic Encryption
Flag this post
Geopolitics, Geoeconomics and Risk:A Machine Learning Approach
arxiv.org·16h
🧠Machine Learning
Flag this post
HoneyBee: Data Recipes for Vision-Language Reasoners
arxiv.org·16h
📊Learned Metrics
Flag this post
Your `while(true)` Email Loop is Broken: 5 B2B Nurturing APIs for Complex Tech Sales
dev.to·1d·
Discuss: DEV
📊Feed Optimization
Flag this post
Beyond Sequences: Unleashing State Space Models for Robotic Vision
dev.to·6h·
Discuss: DEV
🏺Computational Archaeology
Flag this post
Custom STM32 Boards From Scratch! | The Complete Guide
hackster.io·3d
🎮Switch Archaeology
Flag this post
(FULLY OPEN SOURCE) open-computer-use: Computer agents working on their own VMs
github.com·3d·
Discuss: Hacker News
🏠Homelab Orchestration
Flag this post
Verifying Chain-of-Thought Reasoning via Its Computational Graph
arxiv.org·2d
🔗Constraint Handling
Flag this post