Meetup with my tech community of the 2000-2010s โ Catching up with GeekUp
jon.sprig.gsยท8h
๐Indie Hacking
Flag this post
We celebrate the Digital Commons European Digital Infrastructure Consortium, a model built for sharing
blog.okfn.orgยท21h
๐Dublin Core
Flag this post
A Single Gene Could Have Contributed to Neanderthals' Extinction, Study Suggests
smithsonianmag.comยท12h
๐ฆดBinary Paleontology
Flag this post
Merritt Digital Preservation Repository โ October 2025
cdlib.orgยท1d
๐ฆArchive Formats
Flag this post
How scammers use your data to create personalized tricks that work
malwarebytes.comยท17h
๐Binary Similarity
Flag this post
Tap-and-Steal: The Rise of NFC Relay Malware on Mobile Devices
zimperium.comยท1d
๐ซKerberos Attacks
Flag this post
Grokipedia: A First Look
๐ฐContent Curation
Flag this post
Geometric Nets: Unleashing the Power of Shape in AI by Arvind Sundararajan
๐Differential Geometry
Flag this post
Build a prevention-first defense: The Sophos Cybersecurity Toolkit
news.sophos.comยท18h
๐กCybersecurity
Flag this post
A Hybrid Reconstruction Framework for Efficient High-Order Shock-Capturing on Unstructured Meshes
arxiv.orgยท5h
๐บComputational Archaeology
Flag this post
Optimal Information Combining for Multi-Agent Systems Using Adaptive Bias Learning
arxiv.orgยท5h
๐ง Machine Learning
Flag this post
Topological Data Persistence Analysis for Anomaly Detection in Complex Network Systems
๐ณ๏ธPersistent Homology
Flag this post
Built AI Agents That Think Like Geopolitical Masters at FinceptTerminal
๐ฒCellular Automata
Flag this post
The GIL Revealed: Why Python Threading Isn't Really Parallel
๐ฅ๏ธTerminal Renaissance
Flag this post
RAG Explained: How AI Systems Got Smarter by Learning to Look Things Up
๐Multi-vector RAG
Flag this post
Learning osquery
blog.devops.devยท3d
๐Operating system internals
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.comยท18h
๐ฆ Malware Analysis
Flag this post
Loading...Loading more...