Cyber Humanities for Heritage Security
cacm.acm.org·1d
🎭Cultural Informatics
Flag this post
OWC ThunderBay 4 and Older SFF Optiplex PCs - USB Compatibility
reddit.com·1h·
Discuss: r/homelab
🏠Homelab Preservation
Flag this post
Automated Structural Health Monitoring via Multi-Modal Sensor Fusion & Reinforcement Learning
dev.to·8h·
Discuss: DEV
👁️System Observability
Flag this post
People test Nano Banana with PDF paper to whiteboard. I did the exact opposite
quickchat.ai·11h·
Discuss: Hacker News
📄Text Chunking
Flag this post
Use the 3-2-1 Rule to Back Up All Your Important Files
lifehacker.com·2d
💿Backup Strategies
Flag this post
Joy & Curiosity #63
registerspill.thorstenball.com·58m
🌀Brotli Internals
Flag this post
Lang’s theorem — Pt. IV: a mixed-characteristic variant
ayoucis.wordpress.com·12h
λLambda Encodings
Flag this post
High-grade encryption solution protects classified communications, resists quantum attacks
interestingengineering.com·2d
🔐Quantum Security
Flag this post
Using Fuzzy Logic for Decision Making
loufranco.com·2d
🔗Constraint Handling
Flag this post
Is DWPD Still a Useful SSD Spec?
klarasystems.com·2d·
Discuss: Hacker News
💾Persistent Memory
Flag this post
The Limits of Formal Security Models – Dorothy E. Denning (1999)
faculty.nps.edu·3d·
Discuss: Hacker News
🔒WASM Capabilities
Flag this post
[D] Why aren’t there more multimodal large foundation models out there? Especially in AI for science?
reddit.com·1d·
🎙️Whisper
Flag this post
Saving a Rental Ebike From the Landfill
hackaday.com·26m
Circuit Archaeology
Flag this post
Olmo 3 is a fully open LLM
simonwillison.net·9h
🌀Brotli Internals
Flag this post
How X national origin label is not a magic 8-ball at all
justapedia.org·19h·
Discuss: Hacker News
🧲Magnetic Philosophy
Flag this post
A New Bridge Links the Strange Math of Infinity to Computer Science
quantamagazine.org·1d·
📐Mathematical Art
Flag this post
How archiving is adapting to digital creativity
culturalcontent.substack.com·2d·
Discuss: Substack
🧲Magnetic Philosophy
Flag this post
Legacy web forms are the weakest link in government data security
cyberscoop.com·1d
📜Family History Data
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
stack.int.mov·12h·
Discuss: Hacker News
🔌Operating system internals
Flag this post