Note
hsu.cy·10h
⬜Minimalism
Flag this post
Why Preserve? Safeguarding Middle Eastern Heritage in the Digital Age
dpconline.org·2h
🏺Media Archaeology
Flag this post
Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering
research.checkpoint.com·2d
🦠Malware Analysis
Flag this post
AI-based malware makes attacks stealthier and more adaptive
cybersecuritydive.com·17h
🕵️Vector Smuggling
Flag this post
Systems and Protocol Aspects for Circumstellar Environments Research Group
🕸️Mesh Networking
Flag this post
The Death of the Demo
🎧Learned Audio
Flag this post
Building an Interstellar Philosophy
🧲Magnetic Philosophy
Flag this post
I'm Selling No CS Degree
🚀Indie Hacking
Flag this post
We're Counting Birbs Today
📻Homebrew Protocols
Flag this post
Stressed-out LLM-powered robot vacuum cleaner goes into meltdown during simple butter delivery experiment — ‘I'm afraid I can't do that, Dave...’
tomshardware.com·2d
🤖Tape Automation
Flag this post
Putin’s repressive machinery turns inward to target pro-war figures
theguardian.com·4h
🇷🇺Russian Computing
Flag this post
Knowledge Graph for Intelligent Generation of Artistic Image Creation: Constructing a New Annotation Hierarchy
arxiv.org·4h
🎭Cultural Informatics
Flag this post
Building WriteRight: My Journey Creating an AI Writing Assistant with Mastra
⚡Proof Automation
Flag this post
NOWS: Neural Operator Warm Starts for Accelerating Iterative Solvers
arxiv.org·1d
📊Quantization
Flag this post
How AI is Revolutionizing Malware Detection in Modern Software Systems
🦠Malware Analysis
Flag this post
Thoughts on my home lab after a year.
📊Homelab Monitoring
Flag this post
Deploying Rapid Damage Assessments from sUAS Imagery for Disaster Response
arxiv.org·4h
📸TIFF Evolution
Flag this post
Loading...Loading more...