2025-11-15 11:12:12
Curious what the thinking is for an edu to slice off a /24 that ended up at a Bulgarian web hoster.
https://social.bgp.tools/@transfers/statuses/01KA30858R3DSVDK72F1EY82WM
Curious what the thinking is for an edu to slice off a /24 that ended up at a Bulgarian web hoster.
https://social.bgp.tools/@transfers/statuses/01KA30858R3DSVDK72F1EY82WM
Nvidia announces the Alpamayo family of AI models, tools, and datasets for AVs, and details a collaboration with Mercedes-Benz on its first full-stack AV effort (Larry Dignan/Constellation Research)
https://www.constellationr.com/blog-news/i
@… hi Elena! I'm digging deeper into self hosting (I've been doing that for more than 15 years on simple sites, image hosting, and some tools at a web server), but, I'm thinking of using more complex apps. The point, on why I'm writing to you 😃 aren't you afraid of the security side? Thousands of sites are being hacked daily, aren't you afra…
Morning!
I don't really know entirely what I am looking for, so I will explain in it the best way that I can...
Does anyone here know of any Autism specific resources for productivity 'hacks'?
I'm thinking of Apps/Sites/Tools for Apple devices mainly.
#Autism #Productivity
From The Conversation
Canada’s long history with public service media offers a useful model for thinking about how AI could serve the public.
A publicly funded AI system could draw on public-domain materials, government datasets and openly licensed cultural content. It could be offered as an open-source system, making it widely available to researchers, developers and everyday users alike.
Is anyone are of good tools for "the attacker knows the key but not the system" cryptanalysis?
I'm thinking scenarios like "I've dumped external flash and efuses off a target with encrypted firmware, but I don't know the algorithm or image format".
So ciphertext and key are believed to be known, but bit ordering, endianness, algorithm, headers, etc are unknown.