Adapting classical deception theory to cyber counterintelligence: challenges and opportunities
tandfonline.com·15h
🇸🇪Swedish Cryptanalysis
My Top 5 Favourite Features in Python 3.14
blog.codingconfessions.com·16h
🦀Rust Macros
If Anyone Builds It, Everyone Dies: my review
haggstrom.blogspot.com·1d·
🔲Cellular Automata
Eon – An Effects-Based OCaml Nameserver
ryan.freumh.org·14h·
🌐DNS Security
Every Artist Has a Favorite Subject. For Some, That’s Math.
nytimes.com·1d·
Discuss: Hacker News
📐Mathematical Art
The optimistic case for protein foundation model companies
owlposting.com·7h·
Discuss: Hacker News
🔓Open Source Software
When dirt meets data: ScottsMiracle-Gro saved $150M using AI
venturebeat.com·12h·
Discuss: Hacker News
🤖AI Curation
2025-10-10 # LLMs Are Transpilers
alloc.dev·2d·
Discuss: Hacker News
🔄Language Evolution
From Documents to Dialogue: A step-by-step RAG Journey
dev.to·1d·
Discuss: DEV
📊Multi-vector RAG
CIR-CoT: Towards Interpretable Composed Image Retrieval via End-to-End Chain-of-Thought Reasoning
arxiv.org·1d
🧮Vector Embeddings
Scalable Semantic Map Generation via Hierarchical Graph Optimization
dev.to·1d·
Discuss: DEV
Incremental Computation
SECA: Semantically Equivalent and Coherent Attacks for Eliciting LLM Hallucinations
arxiv.org·4d
👑Coq Tactics
When AI Learns to Think
dev.to·2d·
Discuss: DEV
🔲Cellular Automata
MedReflect: Teaching Medical LLMs to Self-Improve via Reflective Correction
arxiv.org·4d
💻Local LLMs
Krish Naik: Complete RAG Crash Course With Langchain In 2 Hours
dev.to·18h·
Discuss: DEV
📊Multi-vector RAG
Memory Retrieval and Consolidation in Large Language Models through Function Tokens
arxiv.org·1d
💻Programming languages
The Library Method: Understanding @cache
dev.to·1d·
Discuss: DEV
Cache Theory