The huge AI security hole
aardvark.co.nz·1d
🔓Hacking
Notes on writing a monovocalic sonnet
muppetlabs.com·2d·
Discuss: Hacker News
🔗Concatenative Languages
Show HN: Markdown to Word – Free Online Converter
markdowntoword.io·3d·
Discuss: Hacker News
📝Text Compression
I tested the speed of popular tunneling services, pretty shocking
localcan.com·2d·
Discuss: Hacker News
🌊Stream Processing
Split Linux – optimized for safely navigating hostile environments
splitlinux.org·1d·
Discuss: Hacker News
🔌Operating system internals
Fifty Years of Open Source Software Supply-Chain Security
cacm.acm.org·20h·
Discuss: Hacker News
🔓Open Source Software
This Week in Security: The Shai-Hulud Worm, ShadowLeak, and Inside the Great Firewall
hackaday.com·21h
🔓Hacking
Bitrig's Swift Interpreter: From Code to Bytecode
bitrig.app·3d·
Discuss: Hacker News
🔧Binary Parsers
Design Tradeoffs at the Edge
usenix.org·1d·
Discuss: Hacker News
🌐DNS over QUIC
Clean Code Tips I Learned from Senior Engineers
blog.algomaster.io·3d·
Discuss: r/programming
📏Code Metrics
Supercharge Your Go Logging with slog-context: Contextual Logging Made Easy
dev.to·21h·
Discuss: DEV
📝Log Parsing
Building My Own CLI Tool: A Better Way to Share Code with LLMs
dev.to·10h·
Discuss: DEV
📟CLI Design
Introducing: Clips Open-Source AI Clipping Tool for Every Creator
dev.to·1d·
Discuss: DEV
🗜️LZW Variants
Deconstructing Intraocular Pressure: A Non-invasive Multi-Stage Probabilistic Inverse Framework
arxiv.org·2d
🧠Machine Learning
Learning Neural Networks by Neuron Pursuit
arxiv.org·4d
🧠Machine Learning
Match Chat: Real Time Generative AI and Generative Computing for Tennis
arxiv.org·3d
🎙️Whisper
Large Language Models Imitate Logical Reasoning, but at what Cost?
arxiv.org·3d
🧠Computational Logic
Metacognitive Reuse: Turning Recurring LLM Reasoning Into Concise Behaviors
arxiv.org·3d
🧠Intelligence Compression
**Automated Geospatial Source Tracing: Predictive Analytics via Bayesian Spatio-Temporal Fusion**
dev.to·2d·
Discuss: DEV
🧮Kolmogorov Complexity