The Analyst’s Gambit: A Second Course in Functional Analysis
noncommutativeanalysis.wordpress.com·3d
⚔️Lean Theorem
USAID contraceptives in Belgium: 'This stock in perfect condition must be seized to meet urgent needs'
lemonde.fr·1d
🛡Cybersecurity
40 Years of Freedom
jxself.org·1d
🔐Capability Systems
Uncanny academic valley: Brian Wansink as proto-chatbot
statmodeling.stat.columbia.edu·16h
🔲Proof Irrelevance
Scattered LAPSUS$ Hunters: Salesforce Extortion Campaign UPDATE
krypt3ia.wordpress.com·2d
🎫Kerberos Attacks
Modesty Is Not a Virtue: Norbert Wiener (1995)
cs.nyu.edu·27m·
Discuss: Hacker News
🧲Magnetic Philosophy
The Engineering Problem with Democracy
defragzone.substack.com·15h·
Discuss: Substack
🧲Magnetic Philosophy
Thoughts on Arattai – Messaging App by Zoho
foss.life·18h·
Discuss: Hacker News
🔗Hash Chains
An Open Letter to Llms.txt
olshansky.info·1h·
Discuss: Hacker News
🚀Indie Hacking
Beginner Guide to VPS Hetzner and Coolify
bhargav.dev·19h·
Discuss: Hacker News
🔐HSM Integration
The Architecture of Civilizational Dysfunction
medium.com·1d·
Discuss: Hacker News
⚙️systems theory
Sonne 4.5 keeps blowing my mind
curzel.it·18h·
Discuss: Hacker News
🔒Linear Types
Ask HN: Systems Development Path
news.ycombinator.com·1d·
Discuss: Hacker News
🦀Rust Borrowing
On The Fragility of Benchmark Contamination Detection in Reasoning Models
arxiv.org·2h
🧪Hardware Fuzzing
RacketCon (fifteenth) October 4-5, 2025
con.racket-lang.org·2d·
🔤Type Theory
Assessment Twins: A Protocol for AI-Vulnerable Summative Assessment
arxiv.org·2h
🔲Cellular Automata
Progressive Bound Strengthening via Doubly Nonnegative Cutting Planes for Nonconvex Quadratic Programs
arxiv.org·2h
🎯Performance Proofs
Real-Time Intrusion Detection via Quantum-Inspired Anomaly Scoring in Autonomous Vehicle Networks
dev.to·2d·
Discuss: DEV
🔐Quantum Security