Identify insecure TLS services with the enhanced runZero Certificate Inventory
runzero.comยท2d
๐Ÿ”Certificate Analysis
Flag this post
Consider a Burner Phone for Your Holiday Travel This Year
cnet.comยท9hยท
Discuss: Hacker News
๐ŸŽฎCartridge Preservation
Flag this post
T-Mobile accessed a whistleblower's personal cell phone account to identify him
medium.comยท2dยท
Discuss: Hacker News
๐Ÿ”—Data Provenance
Flag this post
GPT-4 Functions as Monoidal Structures: Sequential โˆ˜ and Parallel โŠ—
lightcapai.medium.comยท2dยท
Discuss: Hacker News
๐Ÿ”—Concatenative Programming
Flag this post
1967 speech about progress, computers, and staying human in an age of automation
mynamelowercase.comยท9hยท
Discuss: Hacker News
๐Ÿ‡ฌ๐Ÿ‡งBritish Computing
Flag this post
I analyzed the lineups at the most popular nightclubs
dev.karltryggvason.comยท2dยท
Discuss: Hacker News
๐Ÿ“ŠCount-Min Sketch
Flag this post
How we built the demo for the Current NOLA Day 2 keynote using Flink and AI
rmoff.netยท1dยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
Flag this post
Google Releases Magika 1.0: AI-Powered File Type Detection Tool
linuxiac.comยท1d
๐Ÿ”“Open Source Software
Flag this post
How a satellite image allegedly showing atrocities in Sudan was misinterpreted
france24.comยท1d
๐Ÿ“ฐRSS Archaeology
Flag this post
YaGi Antenna for PMR446
hackster.ioยท11h
๐Ÿ“ปHomebrew Protocols
Flag this post
LaSeR: Reinforcement Learning with Last-Token Self-Rewarding
dev.toยท9hยท
Discuss: DEV
๐Ÿง Intelligence Compression
Flag this post
Assessing Climate Vulnerability Risk for Substations in Massachusetts Via Sensitivity Analysis
arxiv.orgยท1d
๐Ÿฆ€Embedded Rust
Flag this post
Palantir: Great Quarter, Greater Caution
seekingalpha.comยท2d
๐Ÿ•ต๏ธVector Smuggling
Flag this post
Cybercrims plant destructive time bomb malware in industrial .NET extensions
theregister.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Flag this post
GAFD-CC: Global-Aware Feature Decoupling with Confidence Calibration for OOD Detection
arxiv.orgยท3d
๐Ÿง Machine Learning
Flag this post
The Next Evolution Of Cybersecurity Is Preemptive
forbes.comยท4d
๐ŸŽฏThreat Hunting
Flag this post
Novel Self-Healing Concrete Composites: AI-Driven Microstructure Optimization via Bayesian Hyperparameter Control
dev.toยท1dยท
Discuss: DEV
โšกIncremental Computation
Flag this post
[$] Toward fast, containerized, user-space filesystems
lwn.netยท2d
๐Ÿ”ฉSystems Programming
Flag this post