Technology Short Take 189
blog.scottlowe.org·3d
🏠Homelab Archaeology
Flag this post
Empirical Characterization Testing
blog.ploeh.dk·5h
🧪Property-Based Testing
Flag this post
An Illustrated Introduction to Linear Algebra, Chapter 2
ducktyped.org·5h·
Discuss: Hacker News
📈Linear programming
Flag this post
New Artificial Neurons Physically Replicate the Brain
scitechdaily.com·15h
🔲Cellular Automata
Flag this post
A/B Testing Could Lead LLMs to Retain Users Instead of Helping Them
newsletter.danielpaleka.com·23h·
Discuss: Hacker News
🔍Concolic Testing
Flag this post
Performance evaluation of image convolution with gradient filters in OpenCL
milania.de·5d·
Discuss: Hacker News
🎞️FFmpeg Filters
Flag this post
Don't give Postgres too much memory
vondra.me·3d·
🦀Rusty Databases
Flag this post
Automated 3D Synaptic Reconstruction via Cryo-ET Data and Adaptive Gaussian Filtering
dev.to·1d·
Discuss: DEV
🏺Computational Archaeology
Flag this post
NocoBase 2.0: Meet Your AI Employees
dev.to·3h·
Discuss: DEV
🔌Interface Evolution
Flag this post
Automated Anomaly Detection and Self-Calibration in CMUT Array Fabrication via Bayesian Optimization
dev.to·7h·
Discuss: DEV
📄Document Digitization
Flag this post
Built Datapizza-AI in PHP on 2011 Raspberry Pi: Edge AI Without GPU
dev.to·1d·
Discuss: DEV
Homebrew CPUs
Flag this post
SLES 16: SUSE's Flagship Linux with AI and Post-Quantum Crypto
heise.de·4h
🔐HSM Integration
Flag this post
Automated Anomaly Detection & Root Cause Analysis in Complex System Simulations via Adaptive Bayesian Networks
dev.to·1d·
Discuss: DEV
Incremental Computation
Flag this post
Novel bidomain partitioned strategies for the simulation of ventricular fibrillation dynamics
arxiv.org·13h
🌊Stream Ciphers
Flag this post
Why Your Observability Strategy Should Start With SLOs
thenewstack.io·2h
👁️System Observability
Flag this post
CharlotteOS – An Experimental Modern Operating System
github.com·2d·
🍎XNU Internals
Flag this post
**Adaptive Algorithmic Profiling & Resource Allocation via Dynamic Markov Chain Optimization**
dev.to·2d·
Discuss: DEV
Incremental Computation
Flag this post
Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.com·1d
💣ZIP Vulnerabilities
Flag this post