Continuous Performance Testing: staying fast
tweag.ioยท23h
๐ŸŽฏPerformance Forensics
Flag this post
Drug themes in science fiction (1974)
gutenberg.orgยท2dยท
Discuss: Hacker News
๐ŸงฒMagnetic Philosophy
Flag this post
The Case of the Tiny Tyrannosaurus Might Have Been Cracked
nytimes.comยท8h
๐ŸฆดBinary Paleontology
Flag this post
Why zero is the most important number in all of mathematics
newscientist.comยท3d
๐Ÿ“šArchive Mathematics
Flag this post
GlyphGL: Open-Source C/C++ header only lightweight OpenGL text renderer
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿ” Terminal Fonts
Flag this post
Ask HN: LLMs enhance productivity so why don't we have more/better software?
news.ycombinator.comยท6hยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
Flag this post
The new identity paradigm must be hybrid, not just human
techradar.comยท8h
๐ŸŽซKerberos History
Flag this post
AI Red Teaming Guide
github.comยท8hยท
Discuss: Hacker News
๐Ÿ Homelab Pentesting
Flag this post
Ultrasound-driven programmable artificial muscles
nature.comยท1d
โœ‹Tactile Computing
Flag this post
Attackers Sell Turnkey Remote Access Trojan 'Atroposia'
darkreading.comยท3d
๐Ÿ”“Hacking
Flag this post
What the Big Three Consultancies are Missing About AI (And the Code That Proves It)
hackernoon.comยท18h
๐ŸŒCultural Algorithms
Flag this post
Automated Assembly Line Fault Prediction via Multi-Modal Data Fusion and Bayesian Neural Networks
dev.toยท6hยท
Discuss: DEV
๐Ÿ‘๏ธSystem Observability
Flag this post
SecureLearn - An Attack-agnostic Defense for Multiclass Machine Learning Against Data Poisoning Attacks
arxiv.orgยท2d
๐Ÿ”Vector Forensics
Flag this post
ChessQA: Evaluating Large Language Models for Chess Understanding
arxiv.orgยท1d
๐Ÿง Intelligence Compression
Flag this post
Quantum Information Rules the Universeโ€”And It Will Reveal the Ultimate Cosmic Mysteries, a Scientist Says
popularmechanics.comยท2d
โฐTime Crystals
Flag this post
Hyperdimensional Semantic Graph Augmentation for Automated Scientific Literature Synthesis
dev.toยท3hยท
Discuss: DEV
๐ŸงญContent Discovery
Flag this post
North Korea's BlueNoroff Expands Scope of Crypto Heists
darkreading.comยท2d
๐Ÿš€Indie Hacking
Flag this post
What Can Be Recovered Under Sparse Adversarial Corruption? Assumption-Free Theory for Linear Measurements
arxiv.orgยท1d
๐Ÿ“Linear Algebra
Flag this post
Oracle has adopted BOOLEAN in 23ai and PostgreSQL had it forever
hexacluster.aiยท1dยท
Discuss: Hacker News
๐ŸงฌPostgreSQL Forensics
Flag this post
Audio Signal Processing Using Time Domain Mel-Frequency Wavelet Coefficient
arxiv.orgยท1d
๐ŸŒŠAudio Wavelets
Flag this post