Winning at the Edges
๐Hardware Security
Flag this post
"Flow" in software development is overrated
๐ณGit
Flag this post
Experiences with AI-Generated Pornography
๐RAG
Flag this post
Quoting Ben Stolovitz
simonwillison.netยท10h
๐๏ธZettelkasten
Flag this post
How to Optimize for AI Search
๐Information Retrieval
Flag this post
Reflection
๐ฌPrompt Engineering
Flag this post
Notes Apps
๐Journaling
Flag this post
Exploiting Data Structures for Bypassing and Crashing Anti-Malware Solutions via Telemetry Complexity Attacks
arxiv.orgยท5h
๐ญTracing
Flag this post
Programming Languages Lie: Variables Arenโt What You Think They Are
๐ฌStatic Analysis
Flag this post
LLM-enhanced Air Quality Monitoring Interface via Model Context Protocol
arxiv.orgยท1d
๐จDesign Systems
Flag this post
TabGemma: Text-Based Tabular ICL via LLM using Continued Pretraining and Retrieval
arxiv.orgยท1d
๐งฎVector Databases
Flag this post
Show HN: Tool2agent โ a protocol for LLM tool feedback workflows
๐Refinement Types
Flag this post
Loading...Loading more...