Author, Director, Performer, Audience
bumbershootsoft.wordpress.com·46m
⚖️Game Preservation Ethics
Flag this post
O(N) the Money: Scaling Vulnerability Research with LLMs
noperator.dev·5d
🔓Hacking
Flag this post
Kotlin Brain Teasers
🧪Binary Fuzzing
Flag this post
Corecursion
λLambda Encodings
Flag this post
automating dependabot reviews, how AI cut 95% of dependency research time
🔗Topological Sorting
Flag this post
Thousands of YouTube videos disguised as cheat codes removed for spreading malware
techradar.com·1d
🦠Malware Analysis
Flag this post
The Not-So Bitter Lesson
🔲Cellular Automata
Flag this post
How Cloudflare’s client-side security made the npm supply chain attack a non-event
blog.cloudflare.com·1d
🛡️WASM Sandboxing
Flag this post
How the U.S. National Science Foundation Enabled Software-Defined Networking
🕸️Mesh Networking
Flag this post
The Justice Stabilizer: Postgres as the Brain of Agentic Cognitive Forensics
🧬PostgreSQL Forensics
Flag this post
Responsible AI design in healthcare and life sciences
aws.amazon.com·1d
🗺️Competency Maps
Flag this post
Automated Incident Response: What It Is and Why You Can’t Afford to Ignore It
vmray.com·3d
🚨Incident Response
Flag this post
Incogni vs DeleteMe: Which data removal platform is your perfect choice?
techradar.com·1d
🔌Archive APIs
Flag this post
MoPHES:Leveraging on-device LLMs as Agent for Mobile Psychological Health Evaluation and Support
arxiv.org·4d
🧠Intelligence Compression
Flag this post
QueST: Incentivizing LLMs to Generate Difficult Problems
arxiv.org·4d
🧮SMT Solvers
Flag this post
From Overwhelmed to Optimized: How We Cut Envoy Logging Costs by 65% While Boosting Throughput 60%
youtube.com·23h
👁️System Observability
Flag this post
Loading...Loading more...