Anthropic finds 250 poisoned documents are enough to backdoor large language models
the-decoder.comยท7h
๐Ÿ”Vector Forensics
Two Kinds of "Relicensing"
writing.kemitchell.comยท1dยท
๐ŸŒณArchive Merkle Trees
A Manifesto for the Programming Desperado
github.comยท6hยท
Discuss: Hacker News
๐Ÿ’ปProgramming languages
When AI Remembers Too Much โ€“ Persistent Behaviors in Agentsโ€™ Memory
unit42.paloaltonetworks.comยท1d
๐Ÿ”ฒCellular Automata
A small rant about compression
codecs.multimedia.cxยท2d
๐Ÿ“ฆDeflate
Open Lineage
usenix.orgยท18h
๐Ÿ”ŒInterface Evolution
Debugging Humidity: Lessons from deploying software in the physical world
physical-ai.ghost.ioยท2hยท
Discuss: Hacker News
๐Ÿ›ก๏ธError Boundaries
New Issue: Archives and Records
archivespublishing.comยท2d
โš–๏ธArchive Ethics
Dynamic Adaptive Redundancy Allocation via Hierarchical Bayesian Optimization
dev.toยท3hยท
Discuss: DEV
๐Ÿ’พStorage Replication
Boosting Unit Test Automation at Audible with Amazon Q Developer
aws.amazon.comยท3h
๐Ÿ”„Reproducible Builds
SSH Security: Why You Should Touch to Verify
ubicloud.comยท14hยท
Discuss: Hacker News
๐Ÿ”’Hardware Attestation
A Year of Gentoo
arch.dogยท8hยท
โ„Nix
Slip โ€“ A Lisp System in JavaScript
lisperator.netยท8hยท
Discuss: Hacker News
๐Ÿ”—Lisp
The artificial complexity of OOXML files (the PPTX case)
blog.documentfoundation.orgยท5hยท
Discuss: Hacker News
๐Ÿ“ŸTerminal Typography
The Bit Shift Paradox: How "Optimizing" Can Make Code 6ร— Slower
hackernoon.comยท2d
๐ŸงฎCompute Optimization
Faking a Rational Design Process in the AI Era: Why Documentation Matters
albertsikkema.comยท14hยท
Discuss: Hacker News
โš™๏ธProof Engineering
Efficient and accurate search in petabase-scale sequence repositories
nature.comยท2dยท
Discuss: Hacker News
๐Ÿ”„Burrows-Wheeler
Experimenting with ACL2 and Claude Code
mikedodds.orgยท10hยท
Discuss: Hacker News
๐Ÿ‘‘Isabelle
Ship Broken Things
matmul.netยท1dยท
Discuss: Hacker News
๐Ÿ”—Topological Sorting