Reputational consequences of victim signaling: Victimhood decreases status
๐Cyber security
Flag this post
The Best Self-Hosted Web Application Firewalls (WAFs) in 2026
blog.devops.devยท17h
๐Cyber security
Flag this post
2025 Meditation App Landscape: Comprehensive Review of Top Mindfulness Platforms
๐คAI
Flag this post
Thoughts on Building Reliable Systems
๐คAI
Flag this post
A Security Model for Systemd
๐Cyber security
Flag this post
Microsoft creates a team to make โhumanist superintelligenceโ
computerworld.comยท1d
๐คAI
Flag this post
Measuring Aleatoric and Epistemic Uncertainty in LLMs: Empirical Evaluation on ID and OOD QA Tasks
arxiv.orgยท2d
๐คAI
Flag this post
Noise Injection: Improving Out-of-Distribution Generalization for Limited Size Datasets
arxiv.orgยท1d
๐คAI
Flag this post
Decoupled Entropy Minimization
arxiv.orgยท2d
๐คAI
Flag this post
Emotion Detection From Social Media Posts
arxiv.orgยท2d
๐Cyber security
Flag this post
TDS Newsletter: The Theory and Practice of Using AI Effectively
towardsdatascience.comยท1d
๐คAI
Flag this post
Loading...Loading more...