Poland charges former registry office employee with providing false identities for Russian spies
the-independent.com·14h
🔍Polish Cryptanalysis
Offensive OSINT s05e10 - Interactive investigative stories part 1
offensiveosint.io·1d
🌐WARC Forensics
Memory chips just 10 atoms thick could vastly increase capacity
newscientist.com·1d
⚛️Quantum Tape
ClayRat campaign uses Telegram and phishing sites to distribute Android spyware
securityaffairs.com·9h
🕵️Vector Smuggling
Avalue EPC-ASL Intel N97 fanless industrial mini PC is designed for 24/7 operation
cnx-software.com·5h
🔌Single Board PC
From Static Rate Limiting to Adaptive Traffic Management in Airbnb’s Key-Value Store
medium.com·13h
🌊Streaming Systems
Turning data into knowledge: How Huawei is upgrading storage for the AI era
techradar.com·13h
💾Persistence Strategies
Fast Matrix Multiply on an Apple GPU
percisely.xyz·2d·
SIMD Vectorization
A Solution to the Paperclip Problem
link.springer.com·3d·
Discuss: Hacker News
🔲Cellular Automata
I/O Multiplexing (select vs. poll vs. epoll/kqueue)
nima101.github.io·1d·
Discuss: Hacker News
🌊Stream Processing
Why Your Password Storage is Fine, But Your File Checksum is Obsolete
dev.to·2d·
Discuss: DEV
Checksum Validation
JEPAs: Unveiling the Hidden Density Oracle Within by Arvind Sundararajan
dev.to·1d·
Discuss: DEV
🧠Machine Learning
timelinize/timelinize
github.com·3h
⏱️Interval Archives
LINQ and Learning to Be Declarative
nickstambaugh.dev·14h·
Discuss: Hacker News
🔗Concatenative Programming
I Built My Own Google Drive
lorbic.com·15h·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
OBCache: Optimal Brain KV Cache Pruning for Efficient Long-Context LLM Inference
arxiv.org·1h
💻Local LLMs
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.org·1h
📐Compression Bounds
Need to sanity check my backup plan before I implement it
youtube.com·2d·
Discuss: r/homelab
💿Backup Strategies
Differential Privacy for Adaptive Weight Aggregation in Federated Tumor Segmentation
arxiv.org·1d
🤐Secure Multiparty
The Library Method: Understanding @cache
dev.to·4h·
Discuss: DEV
Cache Theory