Is This Something?
acecomments.mu.nu·3h
Flag this post
How to Easily Fine-Tune the Donut Model for Receipt Information Extraction
pub.towardsai.net·4h
Flag this post
The New York Times gets ‘AI in the newsroom’ completely wrong
halifaxexaminer.ca·10h
Flag this post
Software Provenance
Flag this post
Antic Magazine Interviews Alan Reeve, the Creator of the Diamond Operating System (1990)
Flag this post
Parsing an HTTP Request
🔧reverse engineering
Flag this post
Auto-sizing images in Kitty (if it fits it sits?)
babbagefiles.xyz·1d
🔧reverse engineering
Flag this post
GlassWorm malware has resurfaced on the Open VSX registry
securityaffairs.com·4h
🔧hardware hacking
Flag this post
Alarming runC Flaws Enable Hackers To Exploit Docker Containers For Root Access
hothardware.com·5h
🔧hardware hacking
Flag this post
7 unusual programming languages that are worth taking a look at
howtogeek.com·1d
🔧reverse engineering
Flag this post
Why Language Models Are “Lost in the Middle”
pub.towardsai.net·2h
Flag this post
Show HN: Dice of Sending – I prefer physical dice but need to roll online
🔧hardware hacking
Flag this post
Giving C a Superpower: custom header file (safe_c.h)
hwisnu.bearblog.dev·1d
🔧reverse engineering
Flag this post
Modder builds Windows 98 handheld gaming PC with Intel Pentium inside
pcgamer.com·7h
🔧hardware hacking
Flag this post
I built a tool to automate your JSON translations for i18next / next-intl / vue-i18n
🔧reverse engineering
Flag this post
Cherry MX Petal Switch Review
theremingoat.com·1d
🔧hardware hacking
Flag this post
Loading...Loading more...