Homomorphic Encryption, Federated Learning, Secure Computation, Confidential Storage

Uncovering diverse water adsorption characteristics in metal–organic frameworks
phys.org·47m
🌡️Preservation Physics
The very simple ways to reduce the risk of being burgled
the-independent.com·5h
🏠Home Automation
Online activities 6 – 12 October
ests.wordpress.com·7h
🏗️Constructive Mathematics
Building Apache Phoenix DynamoDB Compatibility: Zero-Code Multi-Cloud Database Migrations at Scale
engineering.salesforce.com·2h
💿ZFS Archaeology
State-Compute Replication: Parallelizing High-Speed Stateful Packet Processing
danglingpointers.substack.com·1h·
Discuss: Substack
📡Network Stack
Static Bundle Object: Modernizing Static Linking
medium.com·51m·
Discuss: Hacker News
🔗Static Linking
Sia Foundation’s Nonprofit Cloud Model Redefines Data Ownership and Privacy
hackernoon.com·1d
🏠Homelab Federation
Google’s CodeMender: More Dangerous Than Helpful?
nocomplexity.com·5h·
Discuss: Hacker News
🔓Hacking
Bond-Centered Molecular Fingerprint Derivatives: A BBBP Dataset Study
arxiv.org·11h
🔍Vector Forensics
Privacy-Preserving Federated Learning with Homomorphic Encryption for Secure Medical Image Segmentation
dev.to·5d·
Discuss: DEV
🔐Homomorphic Encryption
Fire destroys S. Korean government's cloud storage system, no backups available
dev.to·1d·
Discuss: DEV
💾Persistence Strategies
Certifiable Safe RLHF: Fixed-Penalty Constraint Optimization for Safer Language Models
arxiv.org·11h
🔗Parser Combinators
When ChatGPT Turns Informant
futureofbeinghuman.com·23h·
Discuss: Hacker News
🔓Hacking
A PhD in Snapshots
rbharath.github.io·1d·
Discuss: Hacker News
🧠Machine Learning
WASM in the Kernel: Tales of Triumph and Trouble
riptides.io·1d·
Discuss: Hacker News
🔒WASM Capabilities
Functional Programming Through the Lens of a Philosopher and Linguist
gotopia.tech·10h·
Discuss: Hacker News
🛠Language Design
How To Build Effective Technical Guardrails for AI Applications
towardsdatascience.com·21h
🔗Constraint Handling
Partial Information Decomposition via Normalizing Flows in Latent Gaussian Distributions
arxiv.org·11h
🧠Machine Learning
Cool down with your Digital Dystopia, bro
dedoimedo.com·1d·
Discuss: Hacker News
🧲Magnetic Philosophy
Explainable but Vulnerable: Adversarial Attacks on XAI Explanation in Cybersecurity Applications
arxiv.org·11h
🕵️Vector Smuggling