<h2>Resurrected - Two Latin Texts</h2>
naomiceder.tech·2d
🔤Font Archaeology
The Anatomy of an SSH Config
chuck.is·2d
📦Container Security
The Trump FCC’s CBS ‘Truth Nanny’ Is Unsurprisingly A Trump Lackey Who Has No Idea How Journalism Works
techdirt.com·2h
📡RSS
How to ensure high-quality synthetic wireless data when real-world data runs dry
techxplore.com·2d·
Discuss: Hacker News
🧠Machine Learning
Profiles in Power
nybooks.com·2h
🏰Manuscript Networks
Overthinking vs. Scenario Planning
msthgn.com·2d·
Discuss: Hacker News
🎯Threat Hunting
Revive a Dead Car Battery in Minutes with a Portable Jump Starter. We Show You How.
popularmechanics.com·2d
🎮Cartridge Dumping
Nvidia To Invest $5 Billion in Intel
slashdot.org·2h
🖥️Modern Terminals
A new community for computational science and engineering
news.mit.edu·1d
🧮Theoretical Computer Science
Cramp cocktails and apps - how rugby tracks 'fifth vital sign'
bbc.com·2d
Backus-Naur Form
eDNA can help detect kelp-derived carbon on ocean floor
phys.org·16m
🧬Copy Number Variants
MicroBooNE detector excludes electron neutrino cause of MiniBooNE anomaly
phys.org·2h
🔍Tape Forensics
Inquiry into the history of science shows an early 'inherence' bias
phys.org·2d
🌡️Preservation Physics
Scientists Just Found a Way to Simulate the Universe on a Laptop
scitechdaily.com·2d
🏺Computational Archaeology
Logit Mixture Outlier Exposure for Fine-grained Out-of-Distribution Detection
arxiv.org·2d
🧠Machine Learning
Survival at Any Cost? LLMs and the Choice Between Self-Preservation and Human Harm
arxiv.org·2d
🔲Cellular Automata
LiDAR's Blind Spot: Exploiting Keypoint Vulnerabilities in Autonomous Systems
dev.to·1d·
Discuss: DEV
💿Optical Forensics