22.00.0132 Personal and work systems: how do they interact?
johnnydecimal.com·1d
🏠Personal Archives
IRC Bots to AI Agents: Automation’s First Playground
brajeshwar.com·22h
🏺Protocol Archaeology
Corero Network Security Advances Software-First Approach with Hardware-Agnostic Support
corero.com·4d
🏠Homelab Federation
California's age verification bill for app stores and operating systems takes another step forward
engadget.com·34m
🛡️ARM TrustZone
webxdc/calendar: A mobile-friendly calendar for WebXDC - Codeberg.org
codeberg.org·1d
🔓Open Source Software
Issue 726
iosdevweekly.com·1d
🔌Operating system internals
What to expect at Meta Connect 2025: 'Hypernova' smart glasses, AI and the metaverse
engadget.com·1d
🌈Holographic Storage
Deep Copy
developer.mozilla.org·4d·
Discuss: Hacker News
🌳Persistent Data Structures
Does the world need another distributed queue?
techblog.cloudkitchens.com·4d·
Discuss: r/programming
🌊Streaming Systems
HumanAgencyBench: Scalable Evaluation of Human Agency Support in AI Assistants
arxiv.org·2d
🤖AI Curation
Tokenizing Loops of Antibodies
arxiv.org·2d
🎯Automata theory
HISPASpoof: A New Dataset For Spanish Speech Forensics
arxiv.org·1d
🔍FLAC Forensics
Image-GS: Content-Adaptive Image Representation via 2D Gaussians
github.com·2d·
Discuss: Hacker News
📸PNG Optimization
Automated Targeted Retrieval of Endocytotic Cargo via Multiplexed Microfluidic-AI Hybrid System
dev.to·27m·
Discuss: DEV
🌊Stream Processing
7 Best AI Reverse Image Search Softwares — A Highly Comprehensive Guide
dev.to·2d·
Discuss: DEV
🗜️LZW Variants
Enhanced Drug Repurposing via Multi-Modal Network Analysis & Reinforcement Learning
dev.to·1d·
Discuss: DEV
🔍Vector Forensics
Patchday Microsoft: Malware loopholes in Office and Windows closed
heise.de·3d
🔓Hacking
What We Lost When Ethereum Switched to Proof-of-Stake
hackernoon.com·1d
🤝Distributed Consensus