AI-Powered Shelf Price Verification: Matching Label Prices to POS Server Prices
blog.roboflow.com·1d·
Discuss: Hacker News
Proof Automation
Gernot's List of Systems Benchmarking Crimes
gernot-heiser.org·1d·
🎯Performance Forensics
Behold, my stuff
i.redd.it·14h·
Discuss: r/homelab
🏠Homelab Preservation
Foreground vs. Background: Analyzing Typographic Attack Placement in Autonomous Driving Systems
hackernoon.com·1d
🔍Character Forensics
Scam Facebook groups send malicious Android malware to seniors
malwarebytes.com·22h
🦠Malware Analysis
'Confucius' Cyberspy Evolves From Stealers to Backdoors in Pakistan
darkreading.com·22h
🔓Hacking
EditTrack: Detecting and Attributing AI-assisted Image Editing
arxiv.org·1d
🔍Vector Forensics
A practical blueprint for evaluating conversational AI at scale
dropbox.tech·1d
📏Code Metrics
Ghosts of Unix Past: a historical search for design patterns (2010)
lwn.net·7h·
🏠Homelab Archaeology
"The G in GPU is for Graphics damnit "
ut21.github.io·23h·
Discuss: Hacker News
🔲Cellular Automata
[Guest Diary] Comparing Honeypot Passwords with HIBP, (Wed, Oct 1st)
isc.sans.edu·2d
🔓Password Cracking
LLM Code Review vs. Deterministic SAST Security Tools
blog.fraim.dev·14h·
Discuss: Hacker News
Proof Automation
Tiger Style Coding Philosophy
tigerstyle.dev·1d·
Discuss: Hacker News
🔩Systems Programming
Numeric Pager Code Encoder Tool (Look Alike Cipher)
fcsuper.blogspot.com·1d·
🔤Character Encoding
"Zero-Copy" – a modern data fantasy
blog.metamirror.io·22h·
Discuss: Hacker News
🔗Data Provenance
When we can verify a person but recognize nothing–what are we authenticating?
syntheticauth.ai·21h·
Discuss: Hacker News
📼Cassette Hacking
Source-Free Cross-Domain Continual Learning
arxiv.org·7h
📊Learned Metrics
A Software Analogy
atharvaraykar.com·18h·
Discuss: Hacker News
🔢Denotational Semantics
Analyzing Latent Concepts in Code Language Models
arxiv.org·1d
🔢Denotational Semantics
Vector Databases Guide: RAG Applications 2025
dev.to·1d·
Discuss: DEV
🗂️Vector Databases