- CompSci Weekend SuperThread (July 20, 2018)
- Data Structures for Beginners: Trees
- [Advice] Creating a 3D scan and then manipulating it with software
- Assembly Language for Beginners [pdf]
- What are some good books to understand how exactly a computer works?
- The Autonomous Table That Could
- Need some help!!
- Must Read Books for a Computer Scientist
- Perceptrons from memristors
- Human Computer Interaction projects on Augmented Reality.

- Data Science in 30 Minutes: The Accidental Data Scientist with Katrina Riehl, Director of Data...
- How a Kalman Filter works, in pictures
- Where to begin learning compsci (I don't want to work in tech)
- Researchers develop new method of estimating what ground level view of Earth's surface looks like...
- Big Data with the Count-Min Sketch data stucture
- How Will Data Science Evolve Over The Next Decade?
- Linux Book Bundle at Humble Bundle
- Which is a better course choice?
- Wittgenstein and Turing incidentally anticipate integer overflow while discussing the foundation of...
- How long does it take a programmer to learn a new language for use in a research setting?
- Can NaN be positive or negative?
- Ewan Tang's , a former undergraduate student of Scott Aaronson, polylogarithmic algorithm for user...
- “Breakthrough” algorithm exponentially faster than any previous one | Harvard John A. Paulson...
- Abundance of book pdfs about math, comp sci, hacking, ai, and more. Just thought I'd share it.
- Is the threat of quantum computers over exaggerated?
- Intro to Quantum Computing for Computer Scientists [lecture: 1h 28m] by Andrew Helwer of Microsoft...

- Hackers account for 90% of login attempts at online retailers
- Question about brute force attack protection
- AVG and Malwarebytes don't detect keylogging, as tested by AKLT
- How likely would it be for someone to break out of a VM with this new batch of Spectre Flaws?
- Need recommendations on a Travel Router
- Apps and Services - My balance of security / privacy / convenience for modern day personal...
- quick question linux
- Anonymous Email accounts for the sole purpose of 2FA and account recovery: a good idea?

- Malware from proxy
- Given recent prevalence of social engineering attacks. Is it safe to have phone numbers linked to...
- GIAC Web Application Penetration Tester (GWAPT) Is GWAPT an useful certificate for app pen tester?
- Homomorphic Encryption library over GPU
- I'm using WiFi through my computer, instead of through a router. Is this safe?
- Singapore was top cyberattack target during U.S.-North Korea summit
- PERRLA software update - is it safe?
- Best Security/Privacy Email Provider?
- Non-volatile memory storing pairs of bits in such a way that both bits can be written freely, but...
- If a website is https encrypted but you have a keylogger in your system, are you secure?
- Cyberattacks occurred four times more in 2017 than in previous four years combined
- Forums to ask beginner questions?
- Trusted device removed from my Microsoft account but it was not me. Any ideas how this could have...
- Can someone help me out? I don't now much about laptops and the whole policy
- Gemalto token
- Anyone have info on boot camps?
- Tired of seeing these attempted syncs on my Microsoft account from around the world. Is this a...

- Book for studying advance algorithms.
- Sorting a list of objects with a binary comparator that compares correct with 0.8 accuracy
- Ensuring acyclicity in DAG's (Directed Acyclic Graphs)
- Need help finding suitable datastructure
- 2D binpacking algorithm
- Very confused on how to approach this algorithms question? Exponentiation and then modulus?
- How to get sorted order of heap?
- Hypothesis Testing I: Prerequisites
- automatic beat matching algorithm
- If an algorithm draws lines on a map, is that the same as land surveying?

- Find a combination of records that add up to some weight, but has least average cost
- Is there an algorithm to solve this network flow problem?
- What is a good heuristic for A* in a 3d space with stairs and ladders?
- Algorithm in Javascript
- What's the best way to do a n^2 compares in a 2d vector?
- Is there a similar collision algorithm to AABB when you only need the corners?
- Modified version of packing algorithm
- Connect all nodes with minimal number of 'routers'
- Verlet Integration implemented in the n-Body Problem
- Strict partitioning clustering of points in 2D space into variable (but fixed) length cluster in...
- Algorithm for deciding crafts
- Properties of bitsets reverse ?
- Can you find an algorithm that matches this description?
- Are there any books on history of algorithm?
- Travel through all edges in graph