CACM Practice Welcomes Submissions
Flag this post
Integrating Machine Learning into Physical Security Architecture
cacm.acm.org·4h
Flag this post
Show HN: Open-source OAuth2 server Ory Hydra 25.4 ships OAuth2.1 and Device Auth
🏡Self-hosting
Flag this post
Question the Requirements
lesswrong.com·20h
🔣Formal languages
Flag this post
What is an Infinite Canvas?
infinitecanvas.cc·1d
📊type
Flag this post
Distractor Injection Attacks on Large Reasoning Models: Characterization andDefense
📥Embeddings
Flag this post
"I Like That You Have to Poke Around": Instructors on How Experiential Approaches to AI Literacy Spark Inquiry and Critical Thinking
arxiv.org·1d
📊type
Flag this post
Building OperatorAILIVE: Architecting an AI-Powered 911 Triage System with Kiro
🔣Formal languages
Flag this post
Introducing Layrr - Framer for your Codebase!
Flag this post
Analyzing Amazon EC2 Spot instance interruptions by using event-driven architecture
aws.amazon.com·1d
🏡Self-hosting
Flag this post
Most companies still lag behind on AI targets—how can they catch Up?
techradar.com·1d
🏗️Enterprise Software Architecture
Flag this post
Pluralistic Behavior Suite: Stress-Testing Multi-Turn Adherence to Custom Behavioral Policies
arxiv.org·1d
🔣Formal languages
Flag this post
When Evidence Contradicts: Toward Safer Retrieval-Augmented Generation in Healthcare
arxiv.org·20h
📥Embeddings
Flag this post
Loading...Loading more...