Hacktivate: Capture the Flag
hacktivate.ioΒ·4hΒ·
Discuss: Hacker News
πŸ”’security
Flag this post
The strangest Excel functions you'll never use
makeuseof.comΒ·11h
πŸ“±Local first
Flag this post
Business logic vulnerabilities: The silent cyber threat lurking in South Africa’s digital economy
zawya.comΒ·2d
πŸ”’security
Flag this post
The 7 Statistical Concepts You Need to Succeed as a Machine Learning Engineer
machinelearningmastery.comΒ·1d
πŸ”§Embedded Systems
Flag this post
Electrified atomic vapor system enables new nanomaterial mixtures
phys.orgΒ·2d
πŸ”§Embedded Systems
Flag this post
A Science Roundup - Lots going on!
davidbrin.blogspot.comΒ·7h
πŸ”§Embedded Systems
Flag this post
I want you to understand Chicago
aphyr.comΒ·11hΒ·
Discuss: Hacker News
πŸ”’security
Flag this post
Hardware Cryptocurrency Wallets
discuss.privacyguides.netΒ·12h
πŸ”„Sync Engine
Flag this post
What's the Deal with Euler's Identity?
lcamtuf.substack.comΒ·9hΒ·
Discuss: Substack
πŸ€–AI
Flag this post
Sam Altman just published OpenAI’s official timeline for superintelligence.
threadreaderapp.comΒ·7h
πŸ€–AI
Flag this post
Sub-exponential Growth in Online Word Usage: A Piecewise Power-Law Model
arxiv.orgΒ·2d
🌐WebAssembly
Flag this post
Simplest Kochen-Specker Set
journals.aps.orgΒ·2d
πŸ—„οΈDatabases
Flag this post
Base64 Decoder β€” Unwrap Your Data Like a Secret Message πŸ•΅οΈβ€β™€οΈπŸ“œ
dev.toΒ·1dΒ·
Discuss: DEV
🏠IndieWeb
Flag this post
Automated Fault Injection & Resilience Validation in Embedded Systems via Reinforcement Learning
dev.toΒ·3hΒ·
Discuss: DEV
πŸ”§Embedded Systems
Flag this post
Atroposia Malware Offers Attackers Built-In Tools to Spy, Steal, and Scan Systems
blogger.comΒ·1d
πŸ”’security
Flag this post
πŸ”₯ JavaScript Interview Series(13): Closures in Practice β€” Encapsulation & Privacy
dev.toΒ·6hΒ·
Discuss: DEV
🌐WebAssembly
Flag this post
I wrestled AppSync WebSockets for 4 hours so you don’t have to (React + GraphQL Subscriptions)
dev.toΒ·23hΒ·
Discuss: DEV
🏠IndieWeb
Flag this post
Automated Terahertz Spectral Signature Reconstruction for Non-Destructive Material Authentication
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”§Embedded Systems
Flag this post