Innovative Recommendation Applications Using Two Tower Embeddings at Uber
uber.com·18h·
Discuss: Hacker News
🎛️Feed Filtering
North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads
socket.dev·1d·
Discuss: Hacker News
🚀Indie Hacking
Ship Broken Things
matmul.net·2d·
Discuss: Hacker News
🔗Topological Sorting
A Search Engine in CSS – By Tim Carry – Algolia Stories
stories.algolia.com·10h·
Discuss: Hacker News
🧪Binary Fuzzing
Anthropic finds 250 poisoned documents are enough to backdoor large language models
the-decoder.com·1d
🔍Vector Forensics
ksmbd - Exploiting CVE-2025-37947 (3/3)
blog.doyensec.com·4d·
📦Container Security
Show HN: Compression-Resistant Data Transfers
github.com·3h·
Discuss: Hacker News
🕸️WebP Analysis
Build an Unbreakable EVM Read Stack in Python: Async Web3.py, ABIs, Proxies, and Decimals
dev.to·1d·
Discuss: DEV
🔌Interface Evolution
All in on MatMul? Don’t Put All Your Tensors in One Basket!
sigarch.org·3d·
Homebrew CPUs
Symbiotic Nitrogen Fixation: Engineered Mitochondrial-Plant Cellular Integration via Targeted Protein Delivery
dev.to·2h·
Discuss: DEV
🧬Copy Number Variants
Memgoose – An In-Memory Mongoose Impersonator
github.com·1d·
Discuss: Hacker News
🔄Sync Engine
Estimating Fair Graphs from Graph-Stationary Data
arxiv.org·2d
🌈Spectral Methods
Building an AI Internal Linking Plugin for WordPress
dev.to·23h·
Discuss: DEV
🌀Brotli Internals
Revisiting Mixout: An Overlooked Path to Robust Finetuning
arxiv.org·3d
🧠Learned Codecs
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.org·2d
📐Compression Bounds
Linux 6.18 Lands Retpoline Optimization To Help With Intel E Cores
phoronix.com·14h
CPU Microarchitecture
Dynamic Adaptive Redundancy Allocation via Hierarchical Bayesian Optimization
dev.to·1d·
Discuss: DEV
💾Storage Replication
(FULLY OPEN SOURCE) open-computer-use: Computer agents working on their own VMs
github.com·6h·
Discuss: Hacker News
🏠Homelab Orchestration
CPU Cache-Friendly Data Structures in Go: 10x Speed with Same Algorithm
skoredin.pro·6d·
💨Cache Optimization
Rigorous Evaluation of Microarchitectural Side-Channels with Statistical Model Checking
arxiv.org·6d
🔧Hardware Verification