Read more: Commission does not want counter-proposal to sustainability initiative
swissinfo.chยท19h
๐Ÿ“‹PREMIS Events
Flag this post
Hacking the Color BASIC PRINT command โ€“ part 7
subethasoftware.comยท12h
๐Ÿ“บVT100
Flag this post
Show HN: MyPasswordChecker โ€“ Quantum & Free Password Strength Checker
mypasswordchecker.comยท16hยท
Discuss: Hacker News
๐Ÿ”“Password Cracking
Flag this post
The 6-Step Guide to Acing Your Coding Interview
yasminteles.comยท17hยท
Discuss: Hacker News
โšกProof Automation
Flag this post
Windsurf Codemaps: Understand Code, Before You Vibe It
cognition.aiยท13hยท
๐Ÿ”ฉSystems Programming
Flag this post
Energy Loss Functions for Physical Systems
arxiv.orgยท2h
๐ŸŒก๏ธPreservation Thermodynamics
Flag this post
Agentic Browsers Are Dangerous! AI Vulnerabilities: ChatGPT Atlas, Perplexity Comet
dev.toยท3dยท
Discuss: DEV
๐Ÿ›ก๏ธWASM Sandboxing
Flag this post
A Softโ€‘Fork Proposal for Blockchainโ€‘Based Distributed AI Computation
hackernoon.comยท1d
๐ŸคConsensus Algorithms
Flag this post
Uncrossed Multiflows and Applications to Disjoint Paths
arxiv.orgยท1d
๐Ÿ•ธ๏ธNetwork Topology
Flag this post
Microsoft warns a key OpenAI API is being exploited to launch cyberattacks
techradar.comยท15h
๐Ÿฆ Malware Analysis
Flag this post
I Work in Healthcare, and I Built Syda to Solve One Simple Problem: Test Data
dev.toยท4hยท
Discuss: DEV
๐Ÿ”€CRDT
Flag this post
MCP standard
dev.toยท2dยท
Discuss: DEV
๐ŸบProtocol Archaeology
Flag this post
A Comparative Study of Hybrid Post-Quantum Cryptographic X.509 Certificate Schemes
arxiv.orgยท1d
๐Ÿ”Quantum Security
Flag this post
Automated Defect Prediction via Cross-Entropy Regularized Graph Neural Networks for Microservice Architectures
dev.toยท1dยท
Discuss: DEV
๐Ÿ”—Topological Sorting
Flag this post
Beyond Single-Tokenomics: How Farcaster's Pluralistic Incentives Reshape Social Networking
arxiv.orgยท1d
๐Ÿ”—Hash Chains
Flag this post
RLAC: Reinforcement Learning with Adversarial Critic for Free-Form Generation Tasks
arxiv.orgยท1d
โœจEffect Handlers
Flag this post
Mist-Assisted Federated Learning for Intrusion Detection in Heterogeneous IoT Networks
arxiv.orgยท1d
๐ŸคSecure Multiparty
Flag this post
Algorithmic Trust Calibration via Adversarial Multi-Agent Simulations
dev.toยท5hยท
Discuss: DEV
๐ŸŽฏThreat Hunting
Flag this post
Dialogue as Discovery: Navigating Human Intent Through Principled Inquiry
arxiv.orgยท2d
๐ŸงญContent Discovery
Flag this post