Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·10h
🔐Cryptographic Archaeology
Absolute beginners guide to Emacs (2012)
jesshamrick.com·6h·
Discuss: Hacker News
🪟Awesome windows command-line
Anatomy of a Modern Finetuning API
benanderson.work·1d·
Discuss: Hacker News
💻Local LLMs
How to Build Semantic Search in ASP.NET Core using PostgreSQL
dev.to·3h·
Discuss: DEV
🔍Semantic Search
How I Used ChatGPT to Land My Next Data Science Role
towardsdatascience.com·4h
🗺️Competency Maps
Tiger Style Coding Philosophy
tigerstyle.dev·5d·
Discuss: Hacker News
🔩Systems Programming
🚀 I Replaced Go’s Scheduler — And You Should Too (Here’s How)
dev.to·1d·
Discuss: DEV
🔩Systems Programming
Gernot's List of Systems Benchmarking Crimes
gernot-heiser.org·5d·
🎯Performance Forensics
Full code to build your own AI agent with Python
thenewaiorder.substack.com·13h·
Discuss: Substack
🤖Archive Automation
Declarative Partial Updates Proposal
github.com·3h·
Discuss: Hacker News
🎬WebCodecs
Iteration is all you need: ARC-2 solver inspired by Grover's search algorithm
github.com·2d·
Discuss: Hacker News
Incremental Computation
AI Under the Hood Part I: Understanding the Machine
kennethwolters.com·3d·
Discuss: Hacker News
📼Cassette Combinators
On The Fragility of Benchmark Contamination Detection in Reasoning Models
arxiv.org·18h
🧪Hardware Fuzzing
Vector Databases Guide: RAG Applications 2025
dev.to·4d·
Discuss: DEV
🗂️Vector Databases
Automated Risk Calibration for Shipping Asset-Backed Securities via Dynamic Portfolio Optimization
dev.to·1d·
Discuss: DEV
⚙️Batch Processing
My time at Oracle: functional and design specification reviews
smalldatum.blogspot.com·2h·
💾Persistence Strategies
Adventures on the AI Coding side of things
medium.com·14h·
Discuss: Hacker News
🌍Cultural Algorithms