Pecia system
rhollick.wordpress.com·1h
💧Manuscript Watermarks
Westin's Four States of Privacy
marcusolsson.dev·5h·
Discuss: Hacker News
🔒Privacy Archives
Do language models favor their home countries?
misinforeview.hks.harvard.edu·11h·
Discuss: Hacker News
📰RSS Archaeology
Dynamic Levels of Detail in Evolve
evolvebenchmark.com·1d·
Discuss: Hacker News
🖥️Terminal Renaissance
From Millions to Billions
geocod.io·1d·
Discuss: Hacker News
🗄️Database Internals
What ten years in infrastructure taught me about why the Linux CLI still wins
orangestack.substack.com·23h·
Discuss: Substack
🖥️Self-hosted Infrastructure
LLM Optimization Notes: Memory, Compute and Inference Techniques
gaurigupta19.github.io·3d·
Discuss: Hacker News
💻Local LLMs
Modern Observability Is a Single Braid of Data
thenewstack.io·22h·
Discuss: Hacker News
👁️Observatory Systems
*** OFFICIAL Freeware Software Thread ***
forums.anandtech.com·2d
🏺ZIP Archaeology
Building on vibes: Lessons from three years with LLMs
world.hey.com·7h·
Discuss: Hacker News
🌀Brotli Internals
PhotoDemon offers full-featured image editing in a 20 MB download
techspot.com·16h
📸PNG Optimization
How to Prevent NPM Supply Chain Attacks in CI/CD Pipelines with Container Security
blog.qualys.com·3d
📦Container Security
ObCLIP: Oblivious CLoud-Device Hybrid Image Generation with Privacy Preservation
arxiv.org·2d
🔐Homomorphic Encryption
Channel Simulation and Distributed Compression with Ensemble Rejection Sampling
arxiv.org·1d
Information Bottleneck
TRepLiNa: Layer-wise CKA+REPINA Alignment Improves Low-Resource Machine Translation in Aya-23 8B
arxiv.org·12h
🎙️Whisper
SECA: Semantically Equivalent and Coherent Attacks for Eliciting LLM Hallucinations
arxiv.org·2d
👑Coq Tactics
Fitzpatrick Thresholding for Skin Image Segmentation
arxiv.org·12h
📊Learned Metrics
Vacancy for Digital Archivist at SKAO
dpconline.org·1d
❄️Nordic Preservation
Adversary TTP Simulation Lab
infosecwriteups.com·2d
🏠Homelab Pentesting