Identify insecure TLS services with the enhanced runZero Certificate Inventory
runzero.comยท2d
๐Ÿ”Certificate Analysis
Flag this post
Consider a Burner Phone for Your Holiday Travel This Year
cnet.comยท2hยท
Discuss: Hacker News
๐ŸŽฎCartridge Preservation
Flag this post
libffi/libffi
github.comยท18h
๐Ÿ”ŒInterface Evolution
Flag this post
Ranking LLMs based on 180k French votes (French government's AI arena)
comparia.beta.gouv.frยท4dยท
๐Ÿ”Information Retrieval
Flag this post
How we built the demo for the Current NOLA Day 2 keynote using Flink and AI
rmoff.netยท1dยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
Flag this post
We're Counting Birbs Today
counting-stuff.comยท2dยท
Discuss: Hacker News
๐Ÿ“ปHomebrew Protocols
Flag this post
Creating better tools to read our DNA's hidden instructions
phys.orgยท2d
๐ŸงฌCopy Number Variants
Flag this post
The Reinforcement Learning Handbook: A Guide to Foundational Questions
towardsdatascience.comยท2d
๐Ÿ”ฒCellular Automata
Flag this post
Infrared sensors gain sensitivity with ultra-thin lens for fire and threat monitoring
phys.orgยท4d
๐Ÿ”ฌOptical Physics
Flag this post
Most DevSecOps Advice Is Useless without Contextโ€”Hereโ€™s What Actually Works
docker.comยท1d
๐Ÿ”’WASM Capabilities
Flag this post
Novel Self-Healing Concrete Composites: AI-Driven Microstructure Optimization via Bayesian Hyperparameter Control
dev.toยท20hยท
Discuss: DEV
โšกIncremental Computation
Flag this post
Graph Neural Networks for User Satisfaction Classification in Human-Computer Interaction
arxiv.orgยท1d
๐Ÿ•ธ๏ธGraph Embeddings
Flag this post
Assessing Climate Vulnerability Risk for Substations in Massachusetts Via Sensitivity Analysis
arxiv.orgยท1d
๐Ÿฆ€Embedded Rust
Flag this post
Palantir: Great Quarter, Greater Caution
seekingalpha.comยท1d
๐Ÿ•ต๏ธVector Smuggling
Flag this post
GAFD-CC: Global-Aware Feature Decoupling with Confidence Calibration for OOD Detection
arxiv.orgยท3d
๐Ÿง Machine Learning
Flag this post
[$] Toward fast, containerized, user-space filesystems
lwn.netยท2d
๐Ÿ”ฉSystems Programming
Flag this post
The Next Evolution Of Cybersecurity Is Preemptive
forbes.comยท3d
๐ŸŽฏThreat Hunting
Flag this post