A short video about the Coffee Sniffers (a test video summary)
searchresearch1.blogspot.comยท2dยท
๐Ÿ”Tape Forensics
Post Non Apple Ecosystem Experiment
merecivilian.comยท3d
โ„๏ธNordic Design Philosophy
Apache Software Foundation Unveils Its Branding Overhaul With New Logo, 'The ASF' Name
apache.slashdot.orgยท28m
๐Ÿ”“Free and open source
Show HN: Date Calculator Measure What Matters
datecalculators.orgยท3dยท
Discuss: Hacker News
๐Ÿ”—Data Provenance
Apple Debuts Watches With New Hypertension Feature, Sleep Score
bloomberg.comยท2d
๐Ÿ›ก๏ธARM TrustZone
Trust at Scale: Security and Governance for Open Source Models // Hudson Buzby // #338
podcasters.spotify.comยท2d
๐Ÿ”’WASM Capabilities
How to save Social Security without screwing over poor people
vox.comยท58m
โš™Backus-Naur Form
Rich Answered That
gist.github.comยท2dยท
๐Ÿง Lisp Dialects
Why Charlie Kirk's killing could embolden political violence
phys.orgยท43m
๐Ÿ“ฐRSS Archaeology
Explaining WebSockets: Build Real-time Applications With Python And JavaScript
dev.toยท3dยท
Discuss: DEV
๐ŸŒWebSocket Framing
We got a look at 'Project Maverick,' Dell's top-secret plan to overhaul its systems for the AI future
businessinsider.comยท34m
๐Ÿ–ฅ๏ธTerminal Renaissance
A Markov Decision Process Model for Intrusion Tolerance Problems
arxiv.orgยท2d
๐ŸŽฏThreat Hunting
Augmenting Human-Centered Racial Covenant Detection and Georeferencing with Plug-and-Play NLP Pipelines
arxiv.orgยท3d
๐Ÿ›Digital humanities
Tracking daily paths in home contexts with RSSI fingerprinting based on UWB through deep learning models
arxiv.orgยท3d
๐Ÿ Home Automation
How Do I Buy a Verified Binance Account Step by Step? Ultimate Guide
dev.toยท7hยท
Discuss: DEV
โœ…Checksum Validation
As AI tools reshape education, schools struggle with how to draw the line on cheating
phys.orgยท5h
โœ“Automated Theorem Proving
London bus strike partly called off this weekend โ€“ but some routes still affected
the-independent.comยท1h
๐ŸคConsensus Networks
Weekly: Questions and advice
reddit.comยท3dยท
Discuss: r/kubernetes
๐Ÿ“ฐRSS Reading Practices
Automated Vulnerability Prioritization via Semantic Similarity & Code Attribution Graph Analysis
dev.toยท2dยท
Discuss: DEV
๐Ÿ“Code Metrics