A Shadow of Triality?
golem.ph.utexas.eduยท5d
๐Ÿ”ฒProof Irrelevance
CircuitHub (YC W12) Is Hiring Operations Research Engineers (UK/Remote)
ycombinator.comยท3hยท
Discuss: Hacker News
โš™๏ธDIY Electronics
The Rise of Emotional Intelligence Apps: Equanima's Innovative Approach
equanima.ioยท1hยท
Discuss: Hacker News
๐Ÿง Intelligence Compression
No More Sketchy Data: Why โ€˜Close Enoughโ€™ Wonโ€™t Work In Marketingโ€™s AI Era
adexchanger.comยท1d
๐Ÿ“ŠFeed Optimization
Plastic nanoparticles found inside edible vegetables for first time
the-independent.comยท1h
๐ŸงฒMagnetic Resonance
Give Your Band The Music Of The Bands
hackaday.comยท5h
๐Ÿ“ผCassette Culture
I Stand Here Ironing
nybooks.comยท1h
๐Ÿ“•Bookbinding
Setting up rooted Android emulator with Frida and mitmproxy
trickster.devยท6dยท
Discuss: Hacker News
๐Ÿ•นEmulation
At the Chinese Table
nybooks.comยท1h
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
How I became a machine learning practitioner (2019)
blog.gregbrockman.comยท3dยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
I visited a high school where college isn't the main goal. It's nothing like I expected.
businessinsider.comยท5h
๐Ÿ•ธ๏ธMesh Networking
New Automated npm Attack Campaign Targets Dozens of Packages
decipher.scยท1d
๐Ÿ“ฆPackage Managers
"Why Everything Pam Bondi Said About 'Hate Speech' Is Wrong"
reason.comยท1dยท
Discuss: Hacker News
๐ŸงชArchive Fuzzing
What is JWT? How do Secret, Public, Private Keys actually work?
dev.toยท3dยท
Discuss: DEV
๐Ÿ”‘Cryptographic Protocols
Data Poisoning Attacks
infosecwriteups.comยท5d
๐Ÿ”Vector Forensics
The Performance Cost To Ubuntu WSL2 On Windows 11 25H2
phoronix.comยท2dยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Career Trajectory: Mastering Uncertainty with AI-Driven Simulation
dev.toยท1dยท
Discuss: DEV
๐Ÿ—บ๏ธCompetency Maps
Who Is the Real User of Vibe Coding? From Developer to the Source of the Idea
medium.comยท37mยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Gradient Free Deep Reinforcement Learning With TabPFN
arxiv.orgยท2d
๐Ÿ”ฒCellular Automata