North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
thehackernews.comยท7h
๐นGolang
Flag this post
Introducing Metrax: performant, efficient, and robust model evaluation metrics in JAX
developers.googleblog.comยท1d
๐งDotnet
Flag this post
๐ฒ Minecraft Hosting - Exaroton
lifewaza.comยท1d
๐นGolang
Flag this post
Make SSH as Easy as FTP with SSH Pilot
fossforce.comยท2d
๐นGolang
Flag this post
Commercial Open Source Is Hard: Our Journey
๐งDotnet
Flag this post
Using Rust in Android speeds up development considerably
osnews.comยท1h
๐นGolang
Flag this post
Servo's SpiderMonkey Fork Mozjs
๐นGolang
Flag this post
Amazon Inspector detects over 150,000 malicious packages linked to token farming campaign
aws.amazon.comยท1d
๐งDotnet
Flag this post
EVADE: LLM-Based Explanation Generation and Validation for Error Detection in NLI
arxiv.orgยท1d
๐Elixir
Flag this post
I made open-source version of iLoveImg
๐Elixir
Flag this post
The Production Readiness Checklist
๐งDotnet
Flag this post
Loading...Loading more...