BASIC and homecomputers
thefoggiest.devยท19h
๐พvintage computing
Flag this post
An Interview with Michael Morton About AI E-Commerce
stratechery.comยท19h
๐กRSS
Flag this post
Read more: US subsidiary of Swiss defence contractor hacked
swissinfo.chยท1d
๐กCybersecurity
Flag this post
Secure to Great Lengths
thedailywtf.comยท12h
๐ฏNTLM Attacks
Flag this post
Into the Woods
๐ฒCellular Automata
Flag this post
Why a Unified Email Security Platform is Your Best Defense
blogs.cisco.comยท6h
๐DNS Security
Flag this post
original โ
๐Feed Algorithms
Flag this post
Show HN: Yansu, Serious Coding
๐ขCoding Theory
Flag this post
OpenAI Model Spec
๐WASM Capabilities
Flag this post
Show HN: Kumi โ a portable, declarative, functional core for business logic
โ
Formal Methods
Flag this post
Scientists Are Close to Cracking a Universal Anti-Venom
popularmechanics.comยท4h
๐กFeed Security
Flag this post
Tired of doomscrolling? It's time to start using an 'analog bag.'
businessinsider.comยท8h
๐งชCassette Hacks
Flag this post
How AI is fueling an existential crisis in education
theverge.comยท3h
๐Vector Forensics
Flag this post
10 Polars One-Liners for Speeding Up Data Workflows
kdnuggets.comยท4h
๐Stream Processing
Flag this post
GMoPE:A Prompt-Expert Mixture Framework for Graph Foundation Models
arxiv.orgยท14h
๐ธ๏ธGraph Embeddings
Flag this post
New IDC research highlights a major cloud security shift
microsoft.comยท2h
๐ Homelab Security
Flag this post
Erasing 'Ugly' from the Internet: Propagation of the Beauty Myth in Text-Image Models
arxiv.orgยท2d
๐Digital humanities
Flag this post
Confounding Factors in Relating Model Performance to Morphology
arxiv.orgยท2d
๐Document Grammar
Flag this post
Text-guided Fine-Grained Video Anomaly Detection
arxiv.orgยท2d
๐คAdvanced OCR
Flag this post
Loading...Loading more...