[Call for Participants] Legitimacy of Legal Decisions Adopted Under Radical Uncertainties - University of Lille
europeanlawblog.euยท2d
โš–๏ธLegal Compliance
WISPA Members Vote LibreQoS Product of the Year ๐ŸŽ‰
libreqos.ioยท19h
๐Ÿ“ฐRSS Feed Discovery
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.comยท2d
๐ŸงฌPostgreSQL Forensics
Announcing your first routes to the Internet via BGP
quantum5.caยท2d
๐Ÿ›ฃ๏ธBGP Hijacking
How weโ€™re securing the AI frontier
blog.googleยท4d
๐ŸŽฏThreat Hunting
Two Kinds of "Relicensing"
writing.kemitchell.comยท1dยท
๐ŸŒณArchive Merkle Trees
A Manifesto for Data Realism
medium.comยท1dยท
Discuss: Hacker News
๐ŸงฒMagnetic Philosophy
Outdoor ethernet cable (s/ftp vs utp etc)
i.redd.itยท1dยท
Discuss: r/homelab
๐ŸŒNetwork Protocols
5 Signs Your Business Is a Prime Target for Cyberattacks
kdnuggets.comยท3d
๐Ÿ”“Hacking
CNL: Calico v3.30 - Securing Cloud Native Apps with Kubernetes Gateway API
youtube.comยท3d
๐Ÿ”—Hypermedia APIs
The Bit Shift Paradox: How "Optimizing" Can Make Code 6ร— Slower
hackernoon.comยท2d
๐ŸงฎCompute Optimization
Scientists Finally Corrected a Fatal Flaw in an Unlimited Power Source. An Energy Revolution is Coming.
popularmechanics.comยท1d
๐ŸŒก๏ธPreservation Thermodynamics
Redis patches 13-Year-Old Lua flaw enabling Remote Code Execution
securityaffairs.comยท2d
๐ŸŒWASI
On knot detection via picture recognition
arxiv.orgยท1d
๐Ÿ•ธ๏ธAlgebraic Topology
Prakriti200: A Questionnaire-Based Dataset of 200 Ayurvedic Prakriti Assessments
arxiv.orgยท1d
๐ŸŒ€Brotli Internals
Why did the รผber-protocols fail? A history of OOP RPC
medium.comยท5dยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
Quantum-enhanced Computer Vision: Going Beyond Classical Algorithms
arxiv.orgยท1d
โš›๏ธQuantum Algorithms
H1B-KV: Hybrid One-Bit Caches for Memory-Efficient Large Language Model Inference
arxiv.orgยท2d
๐Ÿ’จCache Optimization
Revisiting Mixout: An Overlooked Path to Robust Finetuning
arxiv.orgยท1d
๐Ÿง Learned Codecs