Microsoft's Voice Clone Becomes Scary & Unsalvageable
darkreading.comยท1d
๐ŸŽ™๏ธWhisper
One Year of PostgreSQL Hacking Workshops
rhaas.blogspot.comยท1dยท
๐ŸงฌPostgreSQL Forensics
Why Sub-Second Responses Matter in the Lakehouse
dremio.comยท1dยท
Discuss: Hacker News
๐ŸŒŠStream Processing
Hacking group claims theft of 1 billion records from Salesforce customer databases
techcrunch.comยท1d
๐Ÿ”“Hacking
AI Under the Hood Part I: Understanding the Machine
kennethwolters.comยท1dยท
Discuss: Hacker News
๐Ÿ“ผCassette Combinators
โ€œVeridical (truthful) Data Scienceโ€: Another way of looking at statistical workflow
statmodeling.stat.columbia.eduยท6d
๐ŸงชData science
Behold, my stuff
i.redd.itยท2dยท
Discuss: r/homelab
๐Ÿ Homelab Preservation
Rising AI Workloads Are Reshaping Asia Pacific Data Centers
dev.toยท1dยท
Discuss: DEV
๐Ÿ Homelab Federation
Automated Airflow Anomaly Detection via Multivariate Time Series Decomposition and Reinforcement Learning
dev.toยท5hยท
Discuss: DEV
๐ŸŒŠStream Processing
Feedback Forensics: A Toolkit to Measure AI Personality
arxiv.orgยท3d
๐Ÿง Intelligence Compression
Geometric Structures and Patterns of Meaning: A PHATE Manifold Analysis of Chinese Character Embeddings
arxiv.orgยท1d
๐Ÿ“Geometric Hashing
Are LLMs Better GNN Helpers? Rethinking Robust Graph Learning under Deficiencies with Iterative Refinement
arxiv.orgยท1d
๐Ÿ’ปLocal LLMs
OpenAI's SORA 2 Release Pattern: What It Means for AI Video
dev.toยท2dยท
Discuss: DEV
๐ŸŽฏEmulator Accuracy
Enhanced Neutrino Oscillation Parameter Determination via Multi-Modal Bayesian Inference
dev.toยท21hยท
Discuss: DEV
๐ŸงฒMagnetic Resonance
Apache Iceberg as the Foundation for Enterprise AI Data: Why MinIO Made Tables Native In AIStor
blog.min.ioยท4d
๐ŸบDatabase Archaeology
Automatic Speech Recognition (ASR) for African Low-Resource Languages: A Systematic Literature Review
arxiv.orgยท2d
๐Ÿ“ABNF Parsing
How to Connect Nested KubeVirt Clusters with Calico and BGP Peering
tigera.ioยท1d
๐Ÿ•ธ๏ธMesh Networking