Programming the TMS9918A Video Display Processor
bumbershootsoft.wordpress.comยท2d
๐ŸŽฎGameboy Emulation
Gemini (2023)
geminiquickst.artยท1dยท
Discuss: Hacker News
๐Ÿ”„Sync Engine
The hidden trade-offs of fine-grained progressive rollouts
surfingcomplexity.blogยท2dยท
Discuss: Hacker News
๐ŸŒŠStream Processing
Shamir's Secret Sharing
en.wikipedia.orgยท6dยท
Discuss: Hacker News
๐Ÿ”Hash Functions
Pursuing a Trick a Long Way Just to See Where It Goes, with Simon Peyton Jones
popovit.chยท1dยท
Discuss: Hacker News
๐Ÿ’ปProgramming languages
A mysterious Chinese AI pentesting tool has appeared online, with over 10,000 downloads so far
techradar.comยท3d
๐Ÿš€Indie Hacking
This Week In Techdirt History: September 7th โ€“ 13th
techdirt.comยท2d
๐Ÿ Personal Archives
The Quiet Revolution in Kubernetes Security
darkreading.comยท5d
๐Ÿ“ฆContainer Security
Companies have a lot of options for AI models to use. Ancestry says it's 'agnostic' and uses many of them.
businessinsider.comยท1d
๐ŸŒCultural Algorithms
# ๐Ÿ› ๏ธ Complete Utility App โ€” The Multi-Tool Desktop Madness I Dropped (And Forgot About)
dev.toยท1dยท
Discuss: DEV
๐ŸชŸAwesome windows command-line
The Ultimate Guide to Buying Old Yahoo accounts
dev.toยท3dยท
Discuss: DEV
๐Ÿ”BitFunnel
Is the Browser Becoming the New Endpoint?
darkreading.comยท6d
๐Ÿ›กCybersecurity
FACTORS: Factorial Approximation for Complementary Two-factor Optimization with Risk-aware Scoring
arxiv.orgยท4h
๐Ÿง Machine Learning
Best Practices for Buy Verified Cash App Accounts Safely
dev.toยท1dยท
Discuss: DEV
๐Ÿ›ก๏ธARM TrustZone
DIV: A Textbook Case Of Yield Trap
seekingalpha.comยท1d
๐Ÿ”BitFunnel
Rapid Assessment of Perovskite Degradation Using Hyperspectral Imaging & Machine Learning
dev.toยท12hยท
Discuss: DEV
๐Ÿ’พDisk Imaging
Mitigating Catastrophic Forgetting and Mode Collapse in Text-to-Image Diffusion via Latent Replay
arxiv.orgยท4h
๐Ÿ“ŠLearned Metrics