Social media is a gnarly coordination problem we need to decompose
awarm.leaflet.pubยท21hยท
Discuss: Hacker News
๐Ÿ“กRSS Readers
Tally courses in Jaipur
dev.toยท1dยท
Discuss: DEV
โš™๏ธPL Implementation
The Security Challenges of HTTP/3 and QUIC โ€“ What You Need to Know
medium.comยท3dยท
Discuss: Hacker News
๐ŸŒNetwork Protocols
Anthropic: A postmortem of three recent issues
simonwillison.netยท7h
๐Ÿ‘๏ธObservatory Systems
Young people are less liberal and courageous than previously thought, Lithuanian study suggests
phys.orgยท13h
๐Ÿ”Soviet Cryptography
GNOME 49 'Brescia' Desktop Environment Released
tech.slashdot.orgยท7h
๐Ÿ”ŒOperating system internals
Stanford pro-Palestine activists plead not guilty in felony vandalism case
mercurynews.comยท5h
๐Ÿ”Hash Functions
Best carpet cleaners to remove stains, tried and tested in a real home
the-independent.comยท15h
โšกModern Compression
Data-driven Smile Design: Personalized Dental Aesthetics Outcomes Using Deep Learning
arxiv.orgยท2d
๐Ÿง Machine Learning
Fundamental limitations of sensitivity metrics for anomaly impact analysis in LTI systems
arxiv.orgยท2d
๐Ÿ›ก๏ธError Boundaries
Design Principles of Software: Building Better Systems
dev.toยท4dยท
Discuss: DEV
๐ŸšShell Calculus
Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass
welivesecurity.comยท5dยท
Discuss: Hacker News
๐Ÿ”’Secure Boot
The scapegoats guide to organizational 'transformation'
softwaredoug.comยท2d
๐Ÿฆ‹Format Metamorphosis
From Blueprint to Brain: AI-Powered Validation for Smarter Factories by Arvind Sundararajan
dev.toยท1dยท
Discuss: DEV
โš™๏ธProof Engineering
Beyond Pixels: Validating Confidence in Image Segmentation Models
dev.toยท1dยท
Discuss: DEV
๐Ÿง Machine Learning
Mitigating Strategy Preference Bias in Emotional Support Conversation via Uncertainty Estimations
arxiv.orgยท1d
โง—Information Bottleneck