The Prime Minister Who Tried to Have a Life Outside the Office
newyorker.comยท14h
โ„๏ธNordic Design Philosophy
Stripped of Myths
nybooks.comยท4d
โ„๏ธNordic Design Philosophy
I have created a tutorial on how to install Mint with BTRFS and Full Disk Encryption!
gist.github.comยท1dยท
Discuss: r/linux
๐Ÿ”’Secure Boot
Sampling at Negative Temperature
cavendishlabs.orgยท1dยท
Discuss: Hacker News
๐ŸงฎKolmogorov Bounds
โ€˜A collective anxiety attackโ€™: the psychology of unexplained drone sightings across Europe
theguardian.comยท1d
๐ŸŽฏThreat Hunting
AI has found 50 bugs in cURL. "AI-native SASTs work well"
etn.seยท12hยท
Discuss: Hacker News
๐ŸงชProtocol Fuzzing
Forget Data Ethics โ€” The Real Battle Is Over Who Owns the Infrastructure
hackernoon.comยท21h
๐ŸงฒMagnetic Philosophy
Open communication may be the only way of reaching highly polarized audiences
phys.orgยท8h
๐ŸคConsensus Networks
When AI Turns Culture into Slop
link.springer.comยท12hยท
Discuss: Hacker News
๐Ÿ›Digital humanities
Python is adding Zstandard to the standard library in 3.14
discuss.python.orgยท14hยท
Discuss: Hacker News
๐Ÿ“šLempel-Ziv
Is the Vibe Coding Bubble Starting to Burst?
finalroundai.comยท7hยท
๐Ÿ”“Hacking
Automated Predictive Maintenance Optimization via Hybrid Bayesian-Markovian Modeling for Tunnel Boring Machines (TBMs)
dev.toยท19hยท
Discuss: DEV
โš™๏ธProof Engineering
Q-Learning with Shift-Aware Upper Confidence Bound in Non-Stationary Reinforcement Learning
arxiv.orgยท20h
๐ŸงฎKolmogorov Bounds
Outsmarting the Noise: Adaptive Cyber Defense with AI by Arvind Sundararajan
dev.toยท2dยท
Discuss: DEV
๐ŸŽฏThreat Hunting
Misunderstood and Misaligned
bozhao.substack.comยท18hยท
Discuss: Substack
๐Ÿ”—Constraint Handling
2 Math Problems Fall to LLM: Tsumura's 554 solved, Majority Optimality Disproved
nednex.comยท14hยท
Discuss: Hacker News
๐ŸงฎSMT Solvers
CVE-2025-61882: Frequently Asked Questions About Oracle E-Business Suite (EBS) Zero-Day and Associated Vulnerabilities
tenable.comยท22h
๐Ÿ”“Hacking
Cyber pirates: US MPs want to strike back with online letters of marque
heise.deยท6h
๐Ÿ›กCybersecurity
Taming Imperfect Process Verifiers: A Sampling Perspective on Backtracking
arxiv.orgยท20h
๐ŸงฎKolmogorov Complexity