Building a Trusted Internet Starts with Hosting Providers
circleid.comยท2h
๐Ÿ Homelab Federation
Interview: Why hospital IT is under pressure
heise.deยท10h
โš–๏ธLossy Compression Ethics
ShinyHunters threatens to release data stolen from dozens of Fortune 500 firms
metacurity.comยท9h
๐ŸŽซKerberos Attacks
Dynamic Levels of Detail in Evolve
evolvebenchmark.comยท6hยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธTerminal Renaissance
Show HN: CodexLocal โ€“ Offline, Privacy-First AI Coding Tutor (WebLLM and RAG)
codexlocal.comยท1dยท
๐ŸŒ€Brotli Dictionary
The Mechanism of Mineral Nucleation and Growth in a Mini-Ferritin
pubs.acs.orgยท1dยท
Discuss: Hacker News
๐Ÿ“„Document Digitization
Show HN: I built a local AI agent desk toy
blog.simone.computerยท1hยท
Discuss: Hacker News
๐ŸŽ™๏ธWhisper
Who owns Express VPN, Nord, Surfshark? VPN relationships explained (2024)
dev.toยท1dยท
Discuss: DEV
๐Ÿ“žWebRTC
The minefield of classifier training
dev.toยท5hยท
Discuss: DEV
๐Ÿ“ŠLearned Metrics
Unlocking Quantum Insights: Making Sense of Quantum Graph Networks
dev.toยท17hยท
Discuss: DEV
๐Ÿ•ธ๏ธTensor Networks
Inside Russian Market: Uncovering the Botnet Empire
rapid7.comยท5h
๐ŸŽซKerberos Attacks
AI-Driven Data Engineering: Building Real-Time Intelligence Pipelines
dev.toยท19hยท
Discuss: DEV
๐ŸŒŠStream Processing
Somatic mutation and selection at population scale
nature.comยท5h
๐ŸงฌCopy Number Variants
Beyond Averages: Quantile-Based AI for High-Stakes Decisions
dev.toยท15hยท
Discuss: DEV
๐Ÿง Intelligence Compression
Generalized rational Prony and Bernoulli methods
arxiv.orgยท1d
๐ŸŽผAudio Lambda Calculus