Cyberpsychology’s Influence on Modern Computing
cacm.acm.org·2d
🎯Threat Hunting
I'm an e-waste consumer
blog.kronis.dev·11h
🎮Cartridge Preservation
Why ‘security as by-product’ is no replacement for modern tooling
reversinglabs.com·1d
🔐Capability Systems
Prince Harry, Meghan Markle Take Aim at Tech Companies’ “Depraved Internal Policies” Putting Children at Risk
hollywoodreporter.com·11h
🧲Magnetic Philosophy
N8n vs. Windmill vs. Temporal
blog.arcbjorn.com·1d·
Discuss: Hacker News
🌊Stream Processing
Hypervisors Demystified: The Backbone of Virtualization Technology
blog.devops.dev·1d
💿Proxmox HA
Zippers: Making Functional "Updates" Efficient (2010)
goodmath.org·2d·
🌳Incremental Parsing
Witches of Essex: Rylan and Prof Alice’s look at one of history’s most shameful periods is unfailingly moving
theguardian.com·5h
🏺Media Archaeology
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.dev·1d·
Discuss: Hacker News
🔐Hash Functions
Vulkan 1.4.329 Released With New Fused-Multiply Add Extension
phoronix.com·11h
🎨LUT Compression
Scientists have discovered a potential candidate for a more scalable qubit
techspot.com·1d·
Discuss: r/technews
⚛️Quantum Tape
Torture, blackmail, extortion: the dangers of queer online dating in Ghana
theguardian.com·1d
📡Feed Security
STPA for Software Systems–Illuminate the Unknown Unknowns
usenix.org·1d
👁️System Observability
Autonomous AI Hacking and the Future of Cybersecurity
schneier.com·1d·
Discuss: Hacker News
🎯Threat Hunting
Netflix is bringing these 5 fun party games to your TV soon – and this Among Us-style clone could be the highlight
techradar.com·1d
📺Retrogaming
See Through Their Eyes: Reconstructing Surgery from Any Angle by Arvind Sundararajan
dev.to·4d·
Discuss: DEV
📐Projective Geometry
London East Asia Film Festival presents Good Bye! Darling (1970) — Fri 31 Oct 2025 @ 8:00pm
cinemamuseum.org.uk·3d
🎞️Cinema Preservation
Fox Entertainment Takes Equity Stake in AI-Microdramas Company Holywater
hollywoodreporter.com·1d
🧠Learned Codecs