ActivityPub 与去中心化社交 - 印记
yinji.org·1h
📡RSS
UTF-8 is a Brilliant Design
iamvishnu.com·17h
🔤Character Encoding
Keeping Data Safe with OpenZFS: Security, Encryption, and Delegation
klarasystems.com·2d
💿ZFS Internals
Kerberoasting
blog.cryptographyengineering.com·2d·
🎫Kerberos Exploitation
Show HN: Modelling a macOS application around my productivity research
openmodeai.com·28m·
Discuss: Hacker News
🎙️Whisper
Demystifying Tensor Parallelism
robotchinwag.com·3d·
Discuss: Hacker News
🕸️Tensor Networks
I started using NotebookLM’s new quiz tools – and they’re actually great for learning
techradar.com·1d
🧠Personal Knowledge Base
EmbeddingGemma Model Card
ai.google.dev·5d·
Discuss: Hacker News
⚙️Compression Benchmarking
My (speculative) master plan for immortality
maxwellnye.com·1d·
Discuss: Hacker News
🏠Homelab Archaeology
Three tiny Go web-server experiments: exposing, executing, and extending
reddit.com·23h·
Discuss: r/golang
🌐WASI
DigitalBridge Group, Inc. (DBRG) Presents At Goldman Sachs Communacopia + Technology Conference 2025 Transcript
seekingalpha.com·20h
Time Capsule Networks
LAVA: Language Model Assisted Verbal Autopsy for Cause-of-Death Determination
arxiv.org·13h
💻Local LLMs
Walking the line between broad scope and lack of legal certainty (T 2387/22)
ipkitten.blogspot.com·1h·
🔲Proof Irrelevance
Advanced Solid-State Electrolyte Interphase Engineering for Enhanced Aerospace Battery Performance
dev.to·23h·
Discuss: DEV
⚙️Tape Engineering
The Hanamaruki Method for AI Dialogue Design — 02
dev.to·2d·
Discuss: DEV
🌍Cultural Algorithms
Sparse Sensor Allocation for Inverse Problems of Detecting Sparse Leaking Emission Sources
arxiv.org·3d
🧮Kolmogorov Bounds
Five Blind Men and the Internet: Towards an Understanding of Internet Traffic
arxiv.org·3d
📡Network Monitoring
This widely used Remote Monitoring tool is being used to deploy AsyncRAT to steal passwords
techradar.com·1d
🔓Hacking
Endo.AI - Multimodal Endocrinology Assistant with Google Gemini
dev.to·1d·
Discuss: DEV
📊Spectrograms