A Guide: Frugality in Offline Events
christophedujarric.com·11h
⏰Time Management
Flag this post
Everything You Need to Know About Centralized Exchange Development
ziuma.com·1d
🛡Cyber Security
Flag this post
First Isolation and Characterization of Bacteria from Operating Nuclear Reactors
🧠PKM Systems
Flag this post
Math Education: What If We Started with Sets and Groups Instead of Numbers?
🧠PKM Systems
Flag this post
Teaching Local Models to Call Tools Like Claude
tomtunguz.com·5h
🧠PKM Systems
Flag this post
Modern perspectives in proof theory (2023)
🧠PKM Systems
Flag this post
On Hacking Back
schneier.com·1d
🛡Cyber Security
Flag this post
StrongSuit Recipient Of "Overall Legal Research Solution of the Year" in 2025 LegalTech Breakthrough Awards Program
prnewswire.com·9h
🛡Cyber Security
Flag this post
Automated Paleomagnetic Anomaly Detection via Hyperdimensional Vector Analysis
🧠PKM Systems
Flag this post
I wrote a "from first principles" guide to building an HTTP/1.1 client in Rust (and C/C++/Python) to compare performance and safety
🛡Cyber Security
Flag this post
Unsupervised Feature Selection Through Group Discovery
arxiv.org·17h
🧠PKM Systems
Flag this post
Google reveals new AI data protection tool Private AI Compute
nordot.app·15h
🧠PKM Systems
Flag this post
Decoupling structural molecular dynamics from excited state lifetimes using few-femtosecond ultraviolet resonant dispersive waves
nature.com·22h
🪨Obsidian
Flag this post
Hierarchically defining bump and pin regions overcomes 3D IC complexity
semiwiki.com·6h
🧠PKM Systems
Flag this post
Compact Artificial Neural Network Models for Predicting Protein Residue - RNA Base Binding
arxiv.org·17h
🧠PKM Systems
Flag this post
New Google Study Reveals Threat Protection Against Text Scams
blogger.com·2d
🛡Cyber Security
Flag this post
Loading...Loading more...