Research Opportunity with Royal Museums Greenwich
dpconline.orgยท2d
๐ŸบComputational Archaeology
Attackers exploit valid logins in SonicWall SSL VPN compromise
securityaffairs.comยท1h
๐ŸŽซKerberos Exploitation
Evidence Preservation: Why iPhone Data Can Expire
blog.elcomsoft.comยท2d
๐ŸŒก๏ธPreservation Entropy
Filmmaker Mode adapts to daylight to fix dark movies
flatpanelshd.comยท12hยท
Discuss: Hacker News
๐Ÿ“ฆDigital Cinema Package
YouTube gets ~5% CTR lift on Shorts by replacing embedding tables with Semantic IDs
shaped.aiยท1d
๐Ÿ“ŠFeed Optimization
Physical Warp Drives
arxiv.orgยท53mยท
Discuss: Hacker News
๐ŸŒก๏ธPreservation Physics
The Health Effects of Electromagnetic Radiation
huijzer.xyzยท6hยท
๐Ÿ“„PostScript
I built physical album cards with NFC tags to teach my son music discovery
fulghum.ioยท21hยท
Discuss: Hacker News
๐Ÿ“ผAudio Cassettes
Eon โ€“ An Effects-Based OCaml Nameserver
ryan.freumh.orgยท7hยท
๐ŸŒDNS Security
Efficient and accurate search in petabase-scale sequence repositories
nature.comยท3dยท
Discuss: Hacker News
๐Ÿ”„Burrows-Wheeler
NetApp DS2426 disk shelf - replacing PSU fans
reddit.comยท54mยท
Discuss: r/homelab
๐Ÿ”ŒSingle Board PC
Building a Streaming Data Pipeline with Kafka and Spark: Real-Time Analytics Implementation Guide
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠApache Kafka
Is the End of Detection-Based Security Here?
thenewstack.ioยท1d
๐ŸŽฏThreat Hunting
Automated Anomaly Detection in Account Takeover via Multi-Modal Graph Neural Network Fusion
dev.toยท13hยท
Discuss: DEV
๐Ÿ”Vector Forensics
New Apple advert makes fun of CrowdStrike bug
heise.deยท5h
๐ŸŽApple Archive