⚠️ Do not use LLMs to privatize your data without Differential Privacy! ⚠️
🔢Homomorphic Encryption
Flag this post
.NET: Avoid Using Guid.CreateVersion7
📦Binary Formats
Flag this post
IBM Patented Euler's 200 year old Math Technique
🌀Naiad
Flag this post
12 Scanners to Find Security Vulnerabilities and Misconfigurations in Kubernetes
🚀Shuttle
Flag this post
Kruskal's Tree Theorem
🌳Fenwick Trees
Flag this post
Fire in the Hole! Benchmarking is broken
🚀Performance
Flag this post
Scaling HNSWs
simonwillison.net·1d
💾Cache Design
Flag this post
Explorations of RDMA in LLM Systems
⚡RDMA
Flag this post
Space-Efficient and Output-Sensitive Algorithms for the Longest Common Bitonic Subsequence
arxiv.org·12h
🎯Van Emde Boas Trees
Flag this post
How Does Digital Trust Actually Work? A Deep Dive into the Science of Secrecy
🔐Cryptography
Flag this post
Educational Byte: How to Find and Install a Fully Decentralized Node on Obyte
hackernoon.com·2d
🔢Homomorphic Encryption
Flag this post
Dangers in Your Gemfile
🏷️Memory Tagging
Flag this post
Loading...Loading more...