Read more: Swiss Attorney General says suspected terror attack was foiled
swissinfo.chยท1h
๐ŸšจIncident Response
simonw/claude-skills
simonwillison.netยท1d
๐Ÿ“„PostScript
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.comยท3d
๐Ÿ“บVT100
The ClickFix Factory: First Exposure of IUAM ClickFix Generator
unit42.paloaltonetworks.comยท4d
๐Ÿ”BitFunnel
Quantum dynamics on your laptop? New technique moves us closer
buffalo.eduยท2hยท
Discuss: Hacker News
โš›๏ธInformation Physics
Strategic Pagination Patterns for APIs
roxeem.comยท21hยท
Discuss: Hacker News
๐Ÿ“Range Queries
Exploring and comparing prominent Russian language cybercriminal forums
cybercrimediaries.comยท23hยท
Discuss: Hacker News
๐Ÿ”“Hacking
What is the new EU border system EES, and how will it work?
theguardian.comยท7h
๐Ÿ”คEBCDIC Privacy
Bitcoin Core 30.0
bitcoincore.orgยท2hยท
Discuss: Hacker News
๐ŸงฌBitstream Evolution
Enhanced Parasitic R/L Extraction in Die-Stacked ICs via Adaptive Finite Element Modeling and Bayesian Optimization
dev.toยท13hยท
Discuss: DEV
โšกCircuit Archaeology
MARC: Memory-Augmented RL Token Compression for Efficient Video Understanding
arxiv.orgยท2d
๐Ÿง Learned Codecs
Exposing Citation Vulnerabilities in Generative Engines
arxiv.orgยท3d
๐Ÿ“œDigital Philology
Automated Anomaly Detection in Time-Series Statistical Spreadsheets via Hyperdimensional Vector Similarity
dev.toยท1dยท
Discuss: DEV
๐Ÿ”คCharacter Classification
The Bit Shift Paradox: How "Optimizing" Can Make Code 6ร— Slower
hackernoon.comยท4d
๐ŸงฎCompute Optimization
Wireshark 4.4.10 and 4.6.0 Released, (Sun, Oct 12th)
isc.sans.eduยท4h
โœ…Archive Fixity
Randomized and quantum approximate matrix multiplication
arxiv.orgยท2d
๐Ÿ”Quantum Cryptography
Biology-driven assessment of deep learning super-resolution imaging of the porosity network in dentin
arxiv.orgยท2d
โง—Information Bottleneck
Random samples from a tetrahedron
johndcook.comยท23h
๐Ÿ’ŽInformation Crystallography
Optimal Stopping in Latent Diffusion Models
arxiv.orgยท2d
๐Ÿง Machine Learning