Awakening an interstellar wanderer: Surprising nickel detection in Comet 3I/ATLAS
space.com·43m
🌈Spectroscopy
Flag this post
22.00.0155 The front door and the elephant
johnnydecimal.com·5h
🗜️Zstandardized Archives
Flag this post
10-26-building-the-rope-operation-for-tensorrent-hardware at Clehaxze
clehaxze.tw·5h
⚡SIMD Vectorization
Flag this post
Mem3nt0 mori – The Hacking Team is back!
securelist.com·11h
🎫Kerberos Exploitation
Flag this post
The Smishing Deluge: China-Based Campaign Flooding Global Text Messages
unit42.paloaltonetworks.com·4d
🌐DNS Security
Flag this post
Show HN: Estimating startup viability using Nobel Prize economics
🏴Scottish Computing
Flag this post
Modern Perfect Hashing
🧪Binary Fuzzing
Flag this post
Rebuilding Search: Velocity Unlocks Correctness, Not the Other Way Around
⚙️Build Archaeology
Flag this post
I Built Quality Control Into an AI Tool's Architecture—Here's What It Generated
🧪Protocol Fuzzing
Flag this post
But What Is the Internet Layer?
📡Network Protocol Design
Flag this post
From Questions to Queries: An AI-powered Multi-Agent Framework for Spatial Text-to-SQL
arxiv.org·10h
🔶Voronoi Diagrams
Flag this post
Internet measurement, resilience, and transparency: a week of stories from Cloudflare Research and friends
blog.cloudflare.com·2h
🕸️Mesh Networking
Flag this post
On Having a Data Object
🗄️Database Internals
Flag this post
VOA : mini secrets manager
🚀Indie Hacking
Flag this post
Unsplittable Cost Flows from Unweighted Error-Bounded Variants
arxiv.org·10h
🧮Algebraic Datatypes
Flag this post
Loading...Loading more...