Dr. Hellyer warns that Gulf region no longer regards U.S. as a dependable security partner
france24.comยท7h
๐Ÿ”Quantum Security
Statistical methods in variety testing
cameroncounts.wordpress.comยท3d
๐Ÿ”Polish Cryptanalysis
Listening to Unreliable Narrators
secondvoice.substack.comยท7hยท
Discuss: Substack
๐Ÿ“œDigital Philology
Open Science round-up: The future of knowledge and who should control it - International Science Council
council.scienceยท3d
๐ŸงฒMagnetic Philosophy
How This Israeli Hacker Bootstrapped Her AI Cyber Company To Profitability
forbes.comยท5hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Tcpreplay โ€“ Modify and Replay Packet Captures Back into the Network
thegraynode.ioยท2dยท
Discuss: Hacker News
๐Ÿ“ŠPCAP Analysis
Causal Artificial Intelligence [Free Textbook]
causalai-book.netยท6dยท
Discuss: Hacker News
๐Ÿง Machine Learning
Lessons Learned: Using Git Workflows to Manage a Multilingual Festival Website
2h10.deยท3dยท
Discuss: Hacker News
๐Ÿ“ฆGit LFS
Dissecting Batching Effects in GPT Inference
le.qun.chยท3dยท
Discuss: Hacker News
๐ŸŒŠStreaming Algorithms
NVIDIA Jetson Thor: a new Blackwell-powered module for AI robots
madcornishprojectionist.co.ukยท7h
๐Ÿ–ฅ๏ธTerminal Renaissance
Double check your Microsoft 365 and Google accounts - this VoidProxy phishing service is hitting them hard
techradar.comยท5h
๐ŸŽซKerberos Attacks
Get Excited About Postgres 18
crunchydata.comยท3dยท
๐Ÿ—„๏ธPostgreSQL WAL
I Built a Handy macOS CLI in 2 Hours with Zero Swift Knowledge
zbeegnew.devยท5dยท
Discuss: Hacker News
๐ŸšShell Automation
The Real Python Podcast โ€“ Episode #265: Python App Hosting Choices & Documenting Python's History
realpython.comยท3d
๐ŸบZIP Archaeology
Design of Reliable and Resilient Electric Power Systems for Wide-Body All-Electric Aircraft
arxiv.orgยท3d
โšกCircuit Design
Are there any tools to simplify using k9s and multiple AWS account/EKS Clusters via SSO?
reddit.comยท3hยท
Discuss: r/kubernetes
๐Ÿ“ฆContainer Security
I Finally Stopped Alt-Tabbing to ChatGPT While Coding
dev.toยท6dยท
Discuss: DEV
๐ŸชŸAwesome windows command-line
Unlock Privacy-First AI: Secure Voice Agents Transform Customer Experience
dev.toยท1dยท
Discuss: DEV
๐ŸคSecure Multiparty
SWE-Mirror: Scaling Issue-Resolving Datasets by Mirroring Issues Across Repositories
arxiv.orgยท4d
๐ŸŽ“Academic Torrents
Real-Time Predictive Maintenance of Wind Turbine Gearboxes via Adaptive MPC and Sparse Sensor Fusion
dev.toยท3dยท
Discuss: DEV
๐Ÿ‘๏ธSystem Observability