Explainer: Permissions, privacy and TCC
eclecticlight.coยท8h
๐ Personal Archives
Flag this post
Codeminer42 Dev Weekly #86
blog.codeminer42.comยท1d
๐ฏGradual Typing
Flag this post
Risky Bulletin: US indicts two rogue cybersecurity employees for ransomware attacks
news.risky.bizยท3d
๐กCybersecurity
Flag this post
The Case for Boring APIs
โกgRPC
Flag this post
Scaling up Prime Video monitoring service reduced costs 90% (archive) (2023)
๐๏ธObservatory Systems
Flag this post
From Dataset to DataFrame to Deployed: Your First Project with Pandas & Scikit-learn
kdnuggets.comยท1d
๐Vector Quantization
Flag this post
Vulkan 1.4.332 Brings A New Qualcomm Extension For AI / ML
phoronix.comยท1d
๐ฆพARM Cortex-M
Flag this post
2025 Meditation App Landscape: Comprehensive Review of Top Mindfulness Platforms
๐ฐFeed Readers
Flag this post
Microsoft's data sovereignty: Now with extra sovereignty!
theregister.comยท1d
๐ฅ๏ธSelf-hosted Infrastructure
Flag this post
Decoupled Entropy Minimization
arxiv.orgยท2d
๐ง Machine Learning
Flag this post
APPLE-SA-11-03-2025-4 macOS Sonoma 14.8.2
seclists.orgยท1d
๐Apple Archive
Flag this post
Flow control in switch ASICs: Part 3 โ Notes on flow control
blog.apnic.netยท1d
๐Stream Processing
Flag this post
๐ Own It or Lose It | The Real Power Behind โNot Your Keys, Not Your Coinsโ
๐Blockchain Archives
Flag this post
Mind the Gap: Missing Cyber Threat Coverage in NIDS Datasets for the Energy Sector
arxiv.orgยท4d
๐ Homelab Pentesting
Flag this post
NVIDIA GPU Operator Explained: Simplifying GPU Workloads on Kubernetes
๐ฅ๏ธTerminal Renaissance
Flag this post
Cisco fixes critical UCCX flaw allowing Root command execution
securityaffairs.comยท1d
๐งชCBOR Fuzzing
Flag this post
A Dynamic Recurrent Adjacency Memory Network for Mixed-Generation Power System Stability Forecasting
arxiv.orgยท1d
๐Linear Algebra
Flag this post
Pro-Russian Hackers Use Linux VMs to Hide in Windows
darkreading.comยท3d
๐Hacking
Flag this post
Loading...Loading more...