Best tool for measuring lots of source code
shape-of-code.comยท1d
๐Ÿ’ปProgramming languages
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.comยท4d
๐Ÿ”Quantum Security
Flag this post
"You Don't Need Kafka, Just Use Postgres" Considered Harmful
morling.devยท16hยท
๐ŸŒŠStreaming Databases
Flag this post
Lawmakers say stolen police logins are exposing Flock surveillance cameras to hackers
techcrunch.comยท10h
๐Ÿ”“Hacking
Flag this post
SLES 16: SUSE's Flagship Linux with AI and Post-Quantum Crypto
heise.deยท20h
๐Ÿ”HSM Integration
Flag this post
Application of predictive machine learning in pen & paper RPG game design
arxiv.orgยท4h
๐Ÿ”ฒCellular Automata
Flag this post
Accelerated Dielectric Barrier Coating Optimization via Multi-Modal Data Fusion & Bayesian Hyperparameter Tuning
dev.toยท14hยท
Discuss: DEV
๐Ÿง Machine Learning
Flag this post
UNILocPro: Unified Localization Integrating Model-Based Geometry and Channel Charting
arxiv.orgยท1d
๐Ÿ“กBluetooth Archaeology
Flag this post
Erasing 'Ugly' from the Internet: Propagation of the Beauty Myth in Text-Image Models
arxiv.orgยท4h
๐Ÿ›Digital humanities
Flag this post
FreakWAN: A floor-routing WAN implementing a chat over bare-LoRa (no LoRaWAN)
github.comยท14hยท
Discuss: Hacker News
๐Ÿ“ปHomebrew Protocols
Flag this post
Quantized Differential Privacy via Learned Noise Injection & Adaptive Clipping (QDP-LAIC)
dev.toยท3dยท
Discuss: DEV
๐Ÿ›ก๏ธDifferential Privacy
Flag this post
โ€˜TruffleNetโ€™ Attack Wields Stolen Credentials Against AWS
darkreading.comยท22h
๐ŸŽซKerberos Attacks
Flag this post
OpenSIR: Open-Ended Self-Improving Reasoner
arxiv.orgยท4h
๐Ÿ”ฎProof Search
Flag this post
Real-Time Wave Function Collapse Prediction via Hybrid Bayesian Filtering and Generative Adversarial Networks
dev.toยท1dยท
Discuss: DEV
โš›๏ธQuantum Storage
Flag this post
Mist-Assisted Federated Learning for Intrusion Detection in Heterogeneous IoT Networks
arxiv.orgยท4h
๐ŸคSecure Multiparty
Flag this post
PROPEX-RAG: Enhanced GraphRAG using Prompt-Driven Prompt Execution
arxiv.orgยท4h
๐Ÿ”Information Retrieval
Flag this post
Chinese hackers target European diplomats with Windows zero-day flaw
techradar.comยท18h
๐Ÿ”“Hacking
Flag this post