Reproducing GPT-2 (124M) in llm.c in 90 minutes for $20
github.comยท57mยท
Discuss: Hacker News
๐Ÿ“ŠPerformance Profiling
The Ternary Manifesto
homepage.cs.uiowa.eduยท5h
๐Ÿ“Concrete Syntax
2025 ISO and CSA STAR certificates now available with two additional services
aws.amazon.comยท1h
๐Ÿ›๏ธPREMIS Metadata
Hyper-Specific Sub-Field: **Fuzzing for IoT Firmware Reverse Engineering**
dev.toยท1dยท
Discuss: DEV
๐ŸงชBinary Fuzzing
Engineered prime editors with minimal genomic errors
nature.comยท12m
๐ŸงฌCopy Number Variants
libvips v8.18.0 Function Pointer Type Confusion in libvips Callback Dispatch
seclists.orgยท1d
๐Ÿฆ€Rust Verification
Is IP fragmentation still considered vulnerable?
blog.apnic.netยท1d
๐ŸŒDNS Security
A Kevin week
blog.mitrichev.chยท2dยท
๐Ÿ“Linear Algebra
Efficient Polynomial Identity Testing Over Nonassociative Algebras
arxiv.orgยท1d
๐ŸงฎAlgebraic Datatypes
How to implement the Outbox pattern in Go and Postgres
medium.comยท1dยท
Discuss: Lobsters
๐Ÿ”CBOR
Digging into the OCI Image Specification (2022)
blog.quarkslab.comยท4hยท
Discuss: Hacker News
๐Ÿ“‹Format Specification
ROC AUC Explained: A Beginnerโ€™s Guide to Evaluating Classification Models
towardsdatascience.comยท3h
๐ŸŽฏArithmetic Coding Theory
This Guy Found a Faster Way to Multiply
popularmechanics.comยท23h
๐ŸŽฏArithmetic Coding Theory
Low-coding tool: Critical vulnerability with highest rating jeopardizes Flowise
heise.deยท1d
๐Ÿ”“Hacking
Security
osso.nlยท1d
๐Ÿ“ฆContainer Security
WebSocket Turbo Intruder: Unearthing the WebSocket Goldmine
portswigger.netยท3h
๐ŸงชProtocol Fuzzing
A Slotted Hash Cons for Alpha Invariance
philipzucker.comยท1dยท
Discuss: Hacker News
ฮปLambda Encodings
Under the Pure Curtain: From RAT to Builder to Coder
research.checkpoint.comยท1d
๐Ÿ”“Hacking
Topological Sort: Managing Mutable Structures in Haskell
mmhaskell.comยท2d
๐Ÿ”—Topological Sorting
Reworking Memory Management in CRuby
railsatscale.comยท13hยท
Discuss: Hacker News
๐Ÿง Memory Allocators