The Next Chapter in Swift Build Technologies
swift.org
Large Language Models for Mathematicians
arxiv.org
ADHD Didn't Break Me–My Parents Did
claimingattention.substack.com
Dell ends hybrid work policy, demands RTO despite remote work pledge
theregister.com
Bzip3: A better and stronger spiritual successor to BZip2
github.com
It's OK to hardcode feature flags
code.mendhak.com
Revisiting Random Number Generation
swlody.dev
Reprompt (YC W24) is hiring an AI Engineer to build world class Location Data
ycombinator.com
Visualizing all books of the world in ISBN-Space
phiresky.github.io
How to Run DeepSeek R1 671B Locally on a $2000 EPYC Server
digitalspaceport.com
The Charlie Sheen effect on HIV testing
sciencedaily.com
Bypass DeepSeek censorship by speaking in hex
substack.com
HD Hyundai set to debut production 14 ton hydrogen wheeled excavator
electrek.co
Datasets from Data.gov Have Disappeared
mashable.com
Show HN: TalkNotes – A site that turns your ideas into tasks
talknotes.tech
From tiny to immense: Geological spotlight on the Alexander Mosaic
journals.plos.org
Earthstar – A database for private, distributed, offline-first applications
earthstar-project.org
How to turn off Apple Intelligence
asurion.com
Breaking Down the NSA's Guidance on Zero Trust Implementations (2024)
blog.aquia.us
Over 90% of U.S. airport towers are understaffed, data shows
cbsnews.com
There's not a lot of "breaking down" happening here. It's the same vague recommendations that can be found in the NSA's own documents, further reinforcing the gap between the guidelines and practitioners.
NSA/NIST/CISA all admirably avoid referring to specific products, but that ship has already sailed. Security today _is_ (unfortunately) a constellation of security products, rather than open source protocols, etc.