Evaluating digital forensic findings in Trojan horse defense cases using Bayesian networks
sciencedirect.comยท23h
๐Ÿ—œ๏ธZIP Forensics
Flag this post
What if software shipped with a software engineer?
manuel.kiessling.netยท3d
๐Ÿ”„Language Evolution
Flag this post
The Riemann zeta function and tuning
en.xen.wikiยท13hยท
Discuss: Hacker News
๐ŸŽผAudio Lambda Calculus
Flag this post
Modern Optimizers โ€“ An Alchemist's Notes on Deep Learning
notes.kvfrans.comยท3hยท
Discuss: Hacker News
๐Ÿ“ŠQuantization
Flag this post
Ranking LLMs based on 180k French votes (French government's AI arena)
comparia.beta.gouv.frยท2dยท
๐Ÿ”Information Retrieval
Flag this post
OAuth Device Code Phishing: Azure vs. Google Compared
bleepingcomputer.comยท3dยท
Discuss: Hacker News
๐ŸŽฏNTLM Attacks
Flag this post
Labs for Broke โ€“ EKS for Pennies
georgedeblog.comยท3dยท
Discuss: Hacker News
๐Ÿ Homelab Federation
Flag this post
Microsoft Configuration Manager to switch to an annual release cadence
theregister.comยท21h
๐Ÿ”HSM Integration
Flag this post
Startup provides a nontechnical gateway to coding on quantum computers
phys.orgยท2d
๐Ÿ”Quantum Security
Flag this post
Adding ISA Ports To Modern Motherboards
hackaday.comยท3d
๐ŸงฒRISC-V Preservation
Flag this post
How to rip your DVDs with Handbrake โ€” preserve your DVD library before bit rot claims another victim
tomshardware.comยท21h
๐Ÿ’ฝMiniDisc Format
Flag this post
Show HN: Flynn's Arcade (Pico8 on Mobile)
news.ycombinator.comยท11hยท
Discuss: Hacker News
๐Ÿ•น๏ธRetro Gaming
Flag this post
Android malware steals your card details and PIN to make instant ATM withdrawals
malwarebytes.comยท17h
๐Ÿ”“Hacking
Flag this post
Part 6B โ€” SaijinOS: Care-Based AI Architecture (Why an OS Must Learn to Breathe)
dev.toยท21hยท
Discuss: DEV
๐Ÿ‡ฏ๐Ÿ‡ตJapanese Computing
Flag this post
Tech With Tim: I Let 3 AIs Compete to Build the Same Appโ€ฆ
dev.toยท11hยท
Discuss: DEV
๐Ÿ“Code Metrics
Flag this post
A new SQL-powered permissions system in Datasette 1.0a20
simonwillison.netยท2d
๐ŸบDatabase Archaeology
Flag this post
Evaluating the Impact of Weather-Induced Sensor Occlusion on BEVFusion for 3D Object Detection
arxiv.orgยท5h
๐Ÿ“Projective Geometry
Flag this post
Risky Bulletin: US indicts two rogue cybersecurity employees for ransomware attacks
news.risky.bizยท2d
๐Ÿ›กCybersecurity
Flag this post
GPU Pro โ€“ Master Your AI Workflow
github.comยท4dยท
๐Ÿ–ฅ๏ธTerminal Renaissance
Flag this post
Operational Technology Security Poses Inherent Risks for Manufacturers
darkreading.comยท1d
๐Ÿ›กCybersecurity
Flag this post