The new container based project structure
markjgsmith.com·1d
📦METS Containers
Mathematical Discoveries of 2024
scientificamerican.com·13h·
Discuss: Hacker News
📐Mathematical Art
Despite opposition, UK government intends to move forward with Digital ID scheme
petition.parliament.uk·20h·
Discuss: Hacker News
⚖️Legal Compliance
Extended T: Augment your design craft with AI tools
authzed.com·12h·
Discuss: Hacker News
📐Mathematical Art
Digital ID – The New Chains of Capitalist Surveillance
theslowburningfuse.wordpress.com·1d·
Discuss: Hacker News
🔐Soviet Cryptography
Social media surveillance is ubiquitous, according to research literature review
phys.org·1d
🧭Content Discovery
Higher-Level Design Patterns
qouteall.fun·15h·
Discuss: Hacker News
Algebraic Effects
Show HN: tstr - PEP 750 Template String Utilities & Backports
github.com·14h·
Discuss: Hacker News
📝Concrete Syntax
What Makes a Language Look Like Itself?
towardsdatascience.com·1d
🔤Character Classification
WireTap: Breaking Server SGX via DRAM Bus Interposition
wiretap.fail·2d·
Discuss: Hacker News
🛡️RISC-V Security
Safeguarding Content Quality Against AI "Slop"
blog.iil.com·1d·
Discuss: Hacker News
🤖AI Curation
Multimodal Foundation Models for Early Disease Detection
arxiv.org·1d
📊Learned Metrics
How Ente Changed the Way I See Photos
ente.io·4h
🏠Personal Archives
IMAGEdit: Let Any Subject Transform
arxiv.org·2d
🏛Digital humanities
Automated Rare Allele Detection & Conservation Prioritization via Hyperdimensional Genomic Fingerprinting
dev.to·12h·
Discuss: DEV
🧬Copy Number Variants
Smart Valves: When Engineering Standards Speak Machine
dev.to·18h·
Discuss: DEV
🌊Stream Processing
CERT-UA warns UAC-0245 targets Ukraine with CABINETRAT backdoor
securityaffairs.com·1d
🔐Soviet Cryptography
A Developer’s Deep Dive with Python
dev.to·8h·
Discuss: DEV
🔗Hash Chains
Is It Thinking or Cheating? Detecting Implicit Reward Hacking by Measuring Reasoning Effort
arxiv.org·1d
🧮Z3 Solver