CVE-2025-11371: Unpatched zero-day in Gladinet CentreStack, Triofox under attack
securityaffairs.comยท19h
๐Ÿ”“Hacking
Sorting Prompts - LLMs are not wrong you just caught them mid thought
kau.shยท1d
โšกProof Automation
GPUs, module upgrades and more site fixes
markjgsmith.comยท17h
๐Ÿ–ฅ๏ธTerminal Renaissance
Controlled Release of Microorganisms from Engineered Living Materials
pubs.acs.orgยท2dยท
Discuss: Hacker News
๐Ÿ“ฆMETS Packaging
Show HN: GitHub-native prediction markets using Issues (no DB)
news.ycombinator.comยท1hยท
Discuss: Hacker News
๐ŸŒŠApache Kafka
ASP.NET Core 9 Essentials โ€ข Albert Tanure & Rafael Herik de Carvalho โ€ข GOTO 2025
youtube.comยท3d
๐ŸŒWASI
Nostr and ATProto (2024)
shreyanjain.netยท6hยท
Discuss: Hacker News
๐Ÿ“กFeed Archaeology
Show HN: Prompts to make AI impersonate 10 programming legends
ai-impersonator.blueprintlab.ioยท1dยท
๐ŸŽ™๏ธWhisper
Superintelligence Isn't Enough
persuasion.communityยท4hยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
SPAD: Specialized Prefill and Decode Hardware for Disaggregated LLM Inference
arxiv.orgยท2dยท
Discuss: r/LLM
๐Ÿ’ปLocal LLMs
LLM-Guided Evolutionary Program Synthesis for Quasi-Monte Carlo Design
arxiv.orgยท5d
๐Ÿ“ผTape Combinators
DeepEN: Personalized Enteral Nutrition for Critically Ill Patients using Deep Reinforcement Learning
arxiv.orgยท2d
๐Ÿง Machine Learning
Contrastive Weak-to-strong Generalization
arxiv.orgยท2d
โง—Information Bottleneck
A small number of samples can poison LLMs of any size
dev.toยท2dยท
Discuss: DEV
๐Ÿ’ปLocal LLMs
Mitigating Premature Exploitation in Particle-based Monte Carlo for Inference-Time Scaling
arxiv.orgยท4d
๐ŸงฎKolmogorov Bounds
Self-Improving LLM Agents at Test-Time
arxiv.orgยท2d
๐Ÿง Intelligence Compression
Automated Design of Peptide-Based Drug Candidates via Constrained Generative Adversarial Networks
dev.toยท1dยท
Discuss: DEV
๐Ÿ”Vector Forensics
Sales pitch about why you should learn statistics
minireference.comยท1d
๐Ÿง Intelligence Compression
Day 29 of python code series..
dev.toยท5hยท
Discuss: DEV
๐Ÿ”ฉSystems Programming
Counterfactual Identifiability via Dynamic Optimal Transport
arxiv.orgยท2d
๐Ÿ”Vector Forensics