Firminia โ€“ Your Personal Assistant for Digital Signature
hackster.ioยท17h
๐Ÿ”„Sync Engine
From Ransom to Revenue Loss
paloaltonetworks.comยท21h
๐ŸšจIncident Response
Implement automated monitoring for Amazon Bedrock batch inference
aws.amazon.comยท15h
๐Ÿ”„Sync Engine
CNL: Prioritising Unpatched CVEs in the Kubernetes Ecosystem
youtube.comยท13h
๐Ÿ“ฆContainer Security
5 Signs Your Business Is a Prime Target for Cyberattacks
kdnuggets.comยท21h
๐Ÿ”“Hacking
Intelligent Search in Rails with Typesense
avohq.ioยท1hยท
Discuss: Hacker News
๐ŸŽฏGradual Typing
Blossom โ€“ Heroku-like deploys on your servers; cheaper, no lock-in
blossom88.comยท1dยท
Discuss: Hacker News
๐Ÿ”„Sync Engine
Show HN: CodexLocal โ€“ Offline, Privacy-First AI Coding Tutor (WebLLM and RAG)
codexlocal.comยท15hยท
Discuss: Hacker News
๐ŸŒ€Brotli Dictionary
A New Way to Design Universal Basic Income in Token Economies
hackernoon.comยท2d
๐ŸŒณArchive Merkle Trees
Safe and Compliant Cross-Market Trade Execution via Constrained RL and Zero-Knowledge Audits
arxiv.orgยท1d
๐ŸŒณArchive Merkle Trees
H1B-KV: Hybrid One-Bit Caches for Memory-Efficient Large Language Model Inference
arxiv.orgยท5h
๐Ÿ’จCache Optimization
Tiga: Accelerating Geo-Distributed Transactions with Synchronized Clocks
muratbuffalo.blogspot.comยท5hยท
๐ŸคDistributed Consensus
How to Recover Stolen Crypto: Hire a Genuine Recovery Expert META TECH RECOVERY PRO
dev.toยท1dยท
Discuss: DEV
๐Ÿ”Hash Functions
Why Data Is the New Gold
estimateproperty.blogspot.comยท3dยท
Discuss: Hacker News
๐Ÿ”—Data Provenance
Dynamic Scheduling in Fiber and Spaceborne Quantum Repeater Networks
arxiv.orgยท5h
โš›๏ธQuantum Tape
Polymorphic Python Malware, (Wed, Oct 8th)
isc.sans.eduยท1h
๐Ÿ”“Hacking
Forking-Sequences
arxiv.orgยท1d
๐ŸŒธBloom Variants
Latency, Light, and Ledger: The Technical Architecture Behind SpaceCoin's Interplanetary Network
hackernoon.comยท2d
๐ŸคDistributed Consensus
We built a CUDA emulator that profiles GPU code with zero hardware
rightnowai.coยท1dยท
Discuss: Hacker News
๐ŸŽฏEmulator Accuracy