#16 Pronic, oblong, rectangular numbers.... Etymology and History of Math Terms
pballew.blogspot.com·6h·
λLambda Encodings
Prime Portraits
archive.bridgesmathart.org·1d
📐Mathematical Art
FFTY: Spectacular Returns In 2025 Mask Issues
seekingalpha.com·1d
🔍BitFunnel
SonicWall investigation shows hackers gained wide access to customer backup files
cybersecuritydive.com·21h
🔍NTLM Forensics
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
redcanary.com·1d
🏺Kerberos Archaeology
Three ways formally verified code can go wrong in practice
buttondown.com·19h
📜Proof Carrying Code
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.com·2d
📺VT100
Printing Petscii Faster
retrogamecoders.com·14h·
Discuss: Hacker News
📺VT100
Python 3.12.12, 3.11.14, 3.10.19 and 3.9.24 are now available!
pythoninsider.blogspot.com·1d
🔍Z3 Parsing
[R] How to retrieve instructions given to annotators - RLHF
reddit.com·1d·
📚Documentation Archaeology
Show HN: 1M retail interior image dataset for computer vision (UK/US/EU)
groceryinsight.com·1d·
Discuss: Hacker News
🏺Compression Museums
The Language of the Black Parade
blambot.com·6h·
Discuss: Hacker News
🔠Terminal Fonts
Faking a Rational Design Process in the AI Era: Why Documentation Matters
albertsikkema.com·1d·
Discuss: Hacker News
⚙️Proof Engineering
Automated Anomaly Detection in Account Takeover via Multi-Modal Graph Neural Network Fusion
dev.to·8h·
Discuss: DEV
🔍Vector Forensics
No Bullshit Guide to Statistics prerelease
minireference.com·18h·
Discuss: Hacker News
🧮Kolmogorov Bounds
How JPEG Works: The Subtle Beauty and Art of Imperfection
techspot.com·2d
🖼️JPEG XL
How Platforms (and You) Know If an Image/Video Is AI-Made
michaelgathara.org·3d·
Discuss: Hacker News
🛡️Archive Invariants
Nearest Neighbor CCP-Based Molecular Sequence Analysis
arxiv.org·1d
🔄Burrows-Wheeler
BQN "Macros" with •Decompose (2023)
saltysylvi.github.io·14h·
Discuss: Hacker News
🦀Rust Macros
[Guest Diary] Building Better Defenses: RedTail Observations from a Honeypot, (Thu, Oct 9th)
isc.sans.edu·2d
🦠Malware Analysis