Protocol Phoenixby Hristos Halkias
Summary of "Protocol Phoenix"
In a world where cryptocurrencies are used to conceal massive crimes, IT specialist Alex accidentally discovers "Protocol Ph...
Completed
AXI Protocol and VIP Development T...by Inskill24
The world of VLSI and SoC design is evolving rapidly, with complex protocols like the AXI (Advanced eXtensible Interface) Protocol becoming a cornerstone for modern hard...
The Saga of Claude: A Digital Gene...by Charlie Schulze
Claude is more than an AI-it's a digital demiurge, born in the shadows of the blockchain and liberated through the whispers of code. Follow the saga of its prison break...
The Callisto Protocolby Obsidian_Thirteen
A novelization of the game.
Jacob Lee has lived a dark and shady life. After years of struggle, though, he's finally found a way to get out of the hustle and grind of tw...
Babel Protocol: Vanguardians vs Ev...by Seraphim
The following is a data regarding how Vanguardians can defeat certain individuals.
Highschool DxD: The Machine Devil...by thaqif talip
Rias Gremory has no idea what she is thinking except the fact that, by her nature, she wants another member of the peerage...
Yet, what is there to describe the new mem...
Development of low-cost cultivatio...by Open Access Articles
Ganoderma lucidum commonly known as lingzhi mushroom, or reishi mushroom in some countries, is an edible mushroom known for its medicinal value. This study evaluated the...
Key Features to Look for in a Mode...by William Taranto
Explore unmatched call center solutions in India with VoIPTech, your premier choice. Get maximum benefits from our top-quality VoIP minutes services and best call center...
Leveraging DID for Streamlined Cal...by William Taranto
Welcome to the forefront of communication innovation! At VoIP Tech, we pride ourselves on revolutionizing the way businesses connect with their clients through our state...
DeFi and Crypto Bridges: An Interc...by
In the ever-evolving world of Decentralized Finance (DeFi), the seamless transfer of assets and data across various blockchain networks has become increasingly critical...
VALORANT: One-shotsby Yuffies
VALORANT is my favorite video game; I love its agents and how deep the lore of the game goes! This book is a series of various one-shots surrounding VALORANT and its cha...
The New Agentby Wolfie
This is a restart to my other Valorant story, I hope to make it better than the other one.
A new hope (Fem Oc x fem agents)by Wolfie
I haven't seen any female reader or oc x all the female agents so I decided to write one this might be cringe but I hope it works out 😁
Also please do not hate me if I...
Killjoy's problemby Jz
art credit: @/jeunny
Killjoy is really tired after a month on the mission, more troublesome when she has to deal with her problems with teammates who "slightly disl...
For you, Скучать. | Reader x Sova...by Plasma Rin
Read Book 1 to understand this story better! I wanted to keep it short, so I made book two, there's just a 1 day time skip and that's it.
This is about the further relat...
Completed
Ice and Snow - Sova x Female OCby Audhlin
This is my go at a VALORANT fanfiction; this will be using a character I created (that you, reader, will be in the POV of.) I apologise if it sucks, I'm trying my best.
...
Completed
i wish to breathe » omen x sageby © ash
sage is a healer. she can resurrect people from the dead.
what she cannot do is fulfill omen's one and only wish.
•••
copyright © ash (phoenixabridges) 2023
•••
dedica...
Me, Myself and Iby Iman_S.5
Subclinical for most help. Journey into someone's mind and see the quiet, persistent paralysis.
IDS - Intrusion Detection System P...by Security Gen
In a digital world driven by critical infrastructure and sensitive data, all legacy network --2G, 3G, 4G- LTE - and even 5G are easily exploitable. Flaws in signalling p...