Microsoft Uses a Thousand Words to Justify Some New Office Icons
pxlnv.comยท1h
๐Ÿ”ŒOperating system internals
Sensor Logger with Email Reports in 10 min (No coding)
hackster.ioยท2d
๐Ÿ”ŒSingle Board PC
A practical blueprint for evaluating conversational AI at scale
dropbox.techยท4d
๐Ÿ“Code Metrics
New major version of Timeclock.Kiwi released
timeclock.kiwiยท3hยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
A UK Police Force Suspends Working From Home After Finding Automated Keystroke Scam
news.slashdot.orgยท1d
๐Ÿ”NTLM Forensics
Taskwarrior CLI โ€“ Workflow Examples
taskwarrior.orgยท1dยท
Discuss: Hacker News
โšกProof Automation
Domain Driven Design in Clojure with Generalized Hiccup
biotz.ioยท3dยท
๐Ÿ”—Functional Compilers
I Do Not Want to Be a Programmer Anymore
mindthenerd.comยท15hยท
Discuss: Hacker News
โšกProof Automation
Exploring 7 Lesser Known AI Coding Extensions for VS Code
dev.toยท2dยท
Discuss: DEV
๐ŸŽ™๏ธWhisper
When we can verify a person but recognize nothingโ€“what are we authenticating?
syntheticauth.aiยท3dยท
Discuss: Hacker News
๐Ÿ“ผCassette Hacking
A DuckDB extension for in-database inference, written in Rust ๐Ÿฆ€
github.comยท4dยท
๐Ÿฆ€Rust Borrowing
Geometric Structures and Patterns of Meaning: A PHATE Manifold Analysis of Chinese Character Embeddings
arxiv.orgยท3d
๐Ÿ“Geometric Hashing
Med-K2N: Flexible K-to-N Modality Translation for Medical Image Synthesis
arxiv.orgยท1h
๐Ÿง Machine Learning
Prompting Techniques for Specialised LLMs
gg.forem.comยท12hยท
Discuss: DEV
โš–๏ธConstraint Logic
Dynamic Risk Mitigation in Blockchain-Enabled Pharmaceutical Supply Chains via Predictive Analytics
dev.toยท1dยท
Discuss: DEV
๐ŸคDistributed Consensus
Indexing, Hashing & Query Optimization in DBMS
dev.toยท11hยท
Discuss: DEV
๐Ÿš€Query Optimization
Multimodal Function Vectors for Spatial Relations
arxiv.orgยท1h
๐ŸงฎVector Embeddings
How to detect promo abuse
fingerprint.comยท3d
๐ŸŽซKerberos Attacks