Wenn die Kundschaft einen Gutschein für die #Buchhandlung „Shakespeare und so …“ in Mainz schenkt, wollen wir das gleich mal umsetzen! #büchernase #SUB
🇺🇦 #NowPlaying on KEXP's #VarietyMix
Vince Guaraldi Trio:
🎵 O Tannenbaum
#VinceGuaraldiTrio
https://joshuagrobathan.bandcamp.com/track/vince-guaraldi-trio-o-tannenbaum-cover
https://open.spotify.com/track/4YhY2qHdBmSX33uj8ms0oq
“TABS [by Mozilla] pulls exactly the data you need—from HTML to Markdown to JSON—using the fastest, most efficient method for each page. It adapts to the structure and complexity of the site, staying stealthy and reliable so your [AI] agents always get what they need without friction.”
Ethical Stealthy AI Scraping (tm) by Mozilla.
#Mozilla
🇺🇦 #NowPlaying on KEXP's #90TEEN
Yeah Yeah Yeahs:
🎵 Soft Shock
#YeahYeahYeahs
https://azultogaband.bandcamp.com/track/soft-shock-yeah-yeah-yeahs-cover
https://open.spotify.com/track/0kzNjXP0hX34NBSIFkbwST
POLAR: Automating Cyber Threat Prioritization through LLM-Powered Assessment
Luoxi Tang, Yuqiao Meng, Ankita Patra, Weicheng Ma, Muchao Ye, Zhaohan Xi
https://arxiv.org/abs/2510.01552
Cardinals Cover 2 - Self-Scouting Complete, So What Will It Look Like https://www.azcardinals.com/podcasts/cardinals-cover-2-self-scouting-complete-so-what-will-it-look-like
Spinons, solitons and random singlets in the spin-chain compound copper benzoate
Ying Chen, Guijing Duan, Yuejiu Zhao, Ning Xi, Bingying Pan, Xiaoyu Xu, Zhanlong Wu, Kefan Du, Shuo Li, Ze Hu, Rui Bian, Xiaoqun Wang, Wei Li, Long Zhang, Yi Cui, Shiyan Li, Rong Yu, Weiqiang Yu
https://arxiv.org/abs/2510.11551…
Hey Now! Best of David Boles, Blogs: Vol. 16 (2025): Buy Now!
Hey, there! Welp, it's that time of the year again -- yes, time for us to ask for the indulgence of your continued, kind, support for this blog by buying our eBook -- Best of David Boles, Blogs: Vol. 16 (2025) -- to show your support so we may continue to publish this blog without advertising while still being able to cover our yearly, ongoing, online publication costs…
Uncovering Vulnerabilities of LLM-Assisted Cyber Threat Intelligence
Yuqiao Meng, Luoxi Tang, Feiyang Yu, Jinyuan Jia, Guanhua Yan, Ping Yang, Zhaohan Xi
https://arxiv.org/abs/2509.23573