The Dunhuang Culture ๆ•ฆ็…Œๆ–‡ๅŒ– Database
digitalorientalist.comยท1d
๐Ÿ“œText Collation
The tyranny of literacy
languagelog.ldc.upenn.eduยท28m
๐ŸŒCultural Computing
Holding AI dupes accountable
gavialib.comยท1d
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Criminal Management Division Quarterly Goals
medium.comยท1d
๐Ÿ“ผCassette Hacking
Is the End of Detection-Based Security Here?
thenewstack.ioยท1d
๐ŸŽฏThreat Hunting
When dirt meets data: ScottsMiracle-Gro saved $150M using AI
venturebeat.comยท10hยท
Discuss: Hacker News
๐Ÿค–AI Curation
Metascience Since 2012: A Personal History
goodscience.substack.comยท39mยท
Discuss: Substack
๐ŸŽ“Academic Torrents
Prediction: The Successor to Postmodernism
a16z.substack.comยท11hยท
Discuss: Substack
๐ŸŒCultural Algorithms
From Defender to Devil? Unintended Risk Interactions Induced by LLM Defenses
arxiv.orgยท1d
โœจEffect Handlers
Citing unease over graft, Japan's Komeito leaves the longstanding ruling coalition headed by the LDP
the-independent.comยท1d
๐Ÿ‡ฏ๐Ÿ‡ตJapanese Computing
How Power BI Can Boost Your Career in 2025: Insights for Aspiring Professionals
dev.toยท1dยท
Discuss: DEV
๐Ÿง Query Planners
Assessing overconfidence among national security officials
phys.orgยท4d
๐Ÿ”ŽOSINT Techniques
The Importance of Email Security
securityscorecard.comยท1d
๐ŸŽฏThreat Hunting
Poland charges former registry office employee with providing false identities for Russian spies
the-independent.comยท2d
๐Ÿ”Polish Cryptanalysis
Dark Web Monitoring Against Invisible Cyber Threats
securityscorecard.comยท1d
๐ŸŽฏThreat Hunting
There will soon be AI agents working on our behalf
blog.cip.orgยท1dยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
What Version of Democracy Will Prevail?
nakedcapitalism.comยท15h
๐ŸคConsensus Networks
WTF is Artificial Intelligence of Things (AIoT)?
dev.toยท1dยท
Discuss: DEV
๐Ÿ Home Automation
Fundamental engineering principles can help identify disease biomarkers more quickly
phys.orgยท7h
โš™๏ธsystems theory