Encrypted Root and ZFS on NixOS
ryanseipp.com·1d
🔒Secure Boot
Refurb weekend: Silicon Graphics Indigo² IMPACT 10000
oldvcr.blogspot.com·11h·
🧲RISC-V Archaeology
tmux-plugins/tmux-resurrect
github.com·3d
🕵️Format Recovery
Exploiting Authorisation Sprawl Is the New Black
news.risky.biz·3d
🔓Hacking
Show HN: Root Managed Services
rootmanagedservices.com·2d·
Discuss: Hacker News
🔌Operating system internals
A Practical Guide to Online Privacy
blog.clear-byte.com·1d·
Discuss: Hacker News
🏠Personal Archives
Adding OR logic forced us to confront why users preferred raw SQL
signoz.io·4d·
Discuss: Hacker News
⛏️SQL Archaeology
LLMs as Retrieval and Recommendation Engines
medium.com·1d·
Discuss: Hacker News
🔍Information Retrieval
Retrieval Augmented Generation (RAG) for Dummies
dev.to·6h·
Discuss: DEV
📊Multi-vector RAG
Handling the Loads (2001)
news.slashdot.org·1d·
Discuss: Hacker News
🌲B-tree Forensics
Automated Verification of Carbon Offset Project Credibility Using Multi-Modal Data Fusion and HyperScore Analysis
dev.to·5h·
Discuss: DEV
🔗Constraint Handling
Unlock Privacy-First AI: Securely Unleash LLMs on Your Customer Data
dev.to·19h·
Discuss: DEV
💻Local LLMs
Spatial Transcriptomics Data Fusion via Multi-Modal Signal Disambiguation and Graph-Enhanced Integration
dev.to·16h·
Discuss: DEV
🌀Riemannian Computing
The Rise of Semantic Entity Resolution
towardsdatascience.com·1h
📄Semantic Chunking
Lessons in Disabling RC4 in Active Directory
syfuhs.net·3d·
🌊Stream Ciphers
Automated Genotyping Error Correction via Bayesian Network Refinement in Applied Biosystems Gene Analyzers
dev.to·2d·
Discuss: DEV
🧬Copy Number Variants
Unlocking LLMs: Secure, Efficient Inference for Everyone
dev.to·1d·
Discuss: DEV
💻Local LLMs
Spiral
spiraldb.com·3d·
Discuss: Hacker News
🏺Database Archaeology
How to Analyze and Optimize Your LLMs in 3 Steps
towardsdatascience.com·3d
🔗Constraint Handling
Day 28: The 10x Performance Breakthrough
dev.to·1d·
Discuss: DEV
👁️System Observability