Show HN: 3D Rubik's Cube Speed Cubing in the Browser
rubiks-cube-sandy.vercel.app·25m·
Discuss: Hacker News
🔧reverse engineering
Flag this post
VTPRACTITIONERS{ACRONIS}: Tracking FileFix, Shadow Vector, and SideWinder
blog.virustotal.com·18h·
🔧hardware hacking
Flag this post
This Game Tests If People Know How Much Porn Characters Have On The Internet, And They’re Failing
kotaku.com·8h
🔧hardware hacking
Flag this post
I converted a rotary phone into a meeting handset
stavros.io·4h
🔧reverse engineering
Flag this post
Lean4 Macros for Implementing Custom Quantifiers
jamesoswald.dev·1d·
Discuss: Hacker News
🔧reverse engineering
Flag this post
7 unusual programming languages that are worth taking a look at
howtogeek.com·1d
🔧reverse engineering
Flag this post
How to Easily Fine-Tune the Donut Model for Receipt Information Extraction
pub.towardsai.net·10h
🔧reverse engineering
Flag this post
Building a Vector Database from Scratch - CapybaraDB
dev.to·3h·
Discuss: DEV
🔧reverse engineering
Flag this post
Epistemic Reject Option Prediction
arxiv.org·1d
🔧reverse engineering
Flag this post
What Are the Facts? Automated Extraction of Court-Established Facts from Criminal-Court Opinions
arxiv.org·1d
🔧reverse engineering
Flag this post
Model Counting for Dependency Quantified Boolean Formulas
arxiv.org·1h
🔧reverse engineering
Flag this post
High-Dimensional Asymptotics of Differentially Private PCA
arxiv.org·1h
🔧reverse engineering
Flag this post
Next-Latent Prediction Transformers Learn Compact World Models
arxiv.org·1h
🔧reverse engineering
Flag this post
From Jupyter Notebook to Production: Complete Guide to ML Model Deployment
dev.to·1d·
Discuss: DEV
🔧reverse engineering
Flag this post
Texans' last-second touchdown leads to crushing bad beat for Jaguars bettors
nytimes.com·13h
🔧reverse engineering
Flag this post
SWAP: Towards Copyright Auditing of Soft Prompts via Sequential Watermarking
arxiv.org·1d
🔧hardware hacking
Flag this post