Make Data Ready for AI With Hygiene, Governance, and Experimentation
thenewstack.io·1h
🔗Data Provenance
Flag this post
Kazhdan Seminar fall 2025 – Starting Today Oct. 19, 2026.
gilkalai.wordpress.com·11h
🧮Theoretical Computer Science
Flag this post
Informatics Researchers Develop Hybrid Quantum-Secure Communication Protocol
informatics.ed.ac.uk·2d
🔐Quantum Security
Flag this post
The knowledge apocalypse
aardvark.co.nz·1h
🧲Magnetic Philosophy
Flag this post
First Kubernetes project
📦Container Security
Flag this post
Generating Fair Consensus Statements with Social Choice on Token-Level MDPs
arxiv.org·2d
🤝Consensus Networks
Flag this post
The Privacy Theater of Hashed PII
matthodges.com·13h
🔐Hash Functions
Flag this post
Hackers Dox ICE, DHS, DOJ, and FBI Officials
wired.com·1d
🔓Hacking
Flag this post
AI, Quantum Computing and Other Emerging Risks
paloaltonetworks.com·2d
🔐Quantum Security
Flag this post
‘Nightmare’ calculation may be too tricky for even quantum computers
newscientist.com·1d
⚛️Quantum Algorithms
Flag this post
Beyond Human Bias: Designing AI with Broader Ethics by Arvind Sundararajan
⚖️Emulation Ethics
Flag this post
Extortion and Ransomware Drive Over Half of Cyberattacks — Sometimes Using AI, Microsoft Finds
it.slashdot.org·6h
🔓Hacking
Flag this post
Google says hackers are turning public blockchains into unkillable malware safehouses
🕵️Vector Smuggling
Flag this post
Notes on the Symbol Grounding Problem
🔤Type Theory
Flag this post
The MCP Server?
📄Document Digitization
Flag this post
Loading...Loading more...