ESCAL8 2025: Gathering Cybersecurity Expertise in Mexico City
bughunters.google.com·18h
🛡Cybersecurity
Flag this post
How a Medieval Poem Fooled Historians About the Black Death for 700 Years
scitechdaily.com·8h
🗝️Paleocryptography
Flag this post
Announcing our first Jupyter Community Funded Proposals
blog.jupyter.org·2d
🌀Brotli Dictionary
Flag this post
iHeartMedia Releases Third in a Series of Consumer Studies,Revealing America’s Deepening Need for Human Connection in an AI-Driven World
rollingstone.com·1d
📡RSS Readers
Flag this post
Your Network, Your Rules: Why DDoS Protection Finally Works on Your Terms
corero.com·1d
🏠Homelab Federation
Flag this post
The FBI Is Targeting the Popular Anti-Paywall Site Archive.Today
lifehacker.com·20h
🗃archives
Flag this post
CasWAF: open-source web application firewall supporting reverse proxy, SSL cert HTTP-01 auto-apply, UA & IP based firewall rules
🛡️WASM Sandboxing
Flag this post
Inside A Billionaire Couple’s Plan To Give Away Their $20 Billion Facebook Fortune
forbes.com·18h
⏳Time Capsule Networks
Flag this post
Why Is the Milky Way Warped?
scientificamerican.com·6h
🌡️Preservation Physics
Flag this post
Civilization Heartbeat Sentinel
📡Network Monitoring
Flag this post
You Should Write An Agent
⚡Proof Automation
Flag this post
Shiroa: MdBook for Typst
🦀Rust Macros
Flag this post
Building Data Tools That Work
🔗Data Provenance
Flag this post
Why Preserve? Exact Editions’ Unlocking of Illustrated Periodicals
dpconline.org·1d
🏛️PREMIS Metadata
Flag this post
The Orchestrator Pattern: Routing Conversations to Specialized AI Agents
🌐Protocol Synthesis
Flag this post
From searching to solving: how Vector Databases transform product discovery
🔍Semantic Search
Flag this post
Loading...Loading more...