The Janusian Genesis: A Chronicle of Emergent Agency in a Self-Modifying Language Model (AI assisted)
funcall.blogspot.comΒ·2dΒ·
πŸ”²Cellular Automata
Flag this post
Security for AI: A Practical Guide to Enforcing Your AI Acceptable Use Policy
tenable.comΒ·2d
πŸ”„Archival Workflows
Flag this post
Qilin ransomware activity is surging, with 100 victims listed in August
metacurity.comΒ·2d
πŸ”“Hacking
Flag this post
The Invention of the Transient Designer
elysia.comΒ·8hΒ·
Discuss: Hacker News
πŸŽ›οΈAudio Synthesis
Flag this post
Meta and TikTok are obstructing researchers’ access to data, European Commission rules
science.orgΒ·1dΒ·
Discuss: Hacker News
πŸŽ“Academic Torrents
Flag this post
Varonis and the Price of Accountability at Scale
strategyofsecurity.comΒ·16hΒ·
Discuss: Hacker News
πŸ”—Data Provenance
Flag this post
Tik Tok saved $300000 per year in computing costs by having an intern partially rewrite a microservice in Rust.
linkedin.comΒ·9hΒ·
Discuss: r/programming
πŸ”©Systems Programming
Flag this post
From Scripts to Scale: Python, Mypy, and the Rise of Static Typing
simplethread.comΒ·8hΒ·
Discuss: Hacker News
🎯Gradual Typing
Flag this post
#4 RFI: From an External URL Into your Application
infosecwriteups.comΒ·2h
πŸ“‘Feed Security
Flag this post
Australian police building AI to translate emoji used by β€˜crimefluencers’
theregister.comΒ·2dΒ·
Discuss: Hacker News
🚨Incident Response
Flag this post
How to Integrate Quantum-Safe Security into Your DevOps Workflow
devops.comΒ·21h
πŸ”Quantum Security
Flag this post
βœ… Day 56 of My Data Analytics Journey β€” Deep Dive into Pandas 🐼✨
dev.toΒ·17hΒ·
Discuss: DEV
πŸ§ͺData science
Flag this post
Contribution-Guided Asymmetric Learning for Robust Multimodal Fusion under Imbalance and Noise
arxiv.orgΒ·5h
πŸ“ŠRate-Distortion Theory
Flag this post
This popular WordPress security plugin has a worrying flaw which exposed user data
techradar.comΒ·19h
πŸ”“Hacking
Flag this post
Stop using pip install... at least not directly. Secure your Python supply chain with pipq.
dev.toΒ·12hΒ·
Discuss: DEV
πŸ›‘οΈCLI Security
Flag this post
The Epistemic Suite: A Post-Foundational Diagnostic Methodology for Assessing AI Knowledge Claims
arxiv.orgΒ·1d
πŸ—ΊοΈCompetency Maps
Flag this post
HTB Academy: Windows Fundamentals
infosecwriteups.comΒ·1h
πŸͺŸAwesome windows command-line
Flag this post
Gmail breach panic? It’s a misunderstanding, not a hack
malwarebytes.comΒ·1d
πŸ”“Hacking
Flag this post