Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.comยท2d
๐Ÿ›กCybersecurity
RSS feed in an Astro blog
amanhimself.devยท14h
๐Ÿ“ฐRSS Feed Discovery
Thumbing through the DNS Trail of the TAOTH Campaign
circleid.comยท22h
๐Ÿ“กDNS Archaeology
Reverse Engineering keyboard firmware with Ghidra
blog.usedbytes.comยท3dยท
Discuss: Hacker News
๐Ÿ”“Reverse engineering
A small number of samples can poison LLMs of any size
anthropic.comยท2dยท
๐Ÿ”Vector Forensics
Why Haskell is the perfect fit for renewable energy tech
mrcjkb.devยท4dยท
Discuss: Hacker News
๐ŸงฌFunctional Programming
Sandy Maguire: Theorems for Free Redux
reasonablypolymorphic.comยท3dยท
Discuss: Hacker News
ฮปLambda Encodings
The Bit Shift Paradox: How "Optimizing" Can Make Code 6ร— Slower
hackernoon.comยท4d
๐ŸงฎCompute Optimization
Can Speech LLMs Think while Listening?
arxiv.orgยท2d
๐ŸŽ™๏ธWhisper
Mitigating Judgment Preference Bias in Large Language Models through Group-Based Polling
arxiv.orgยท2d
๐Ÿ’ปLocal LLMs
Construction of new 1130 MRAM memory board completed
rescue1130.blogspot.comยท1dยท
๐Ÿ› ๏ธGreaseweazle
LLC Artificial Intelligence Trained to Lie by Omission
dev.toยท1dยท
Discuss: DEV
๐Ÿ“Code Metrics
Bayesian Optimization for Dynamic Sample Size Allocation in A/B Testing
dev.toยท18hยท
Discuss: DEV
๐ŸงฎKolmogorov Bounds
ACMID: Automatic Curation of Musical Instrument Dataset for 7-Stem Music Source Separation
arxiv.orgยท2d
๐ŸŽตAudio Formats
Beyond Vector Search: Building a RAG That *Actually* Understands Your Data
dev.toยท3dยท
Discuss: DEV
๐Ÿ—‚๏ธVector Databases
The Library Method: Understanding @cache
dev.toยท2dยท
Discuss: DEV
โšกCache Theory
Nearly Instance-Optimal Parameter Recovery from Many Trajectories via Hellinger Localization
arxiv.orgยท3d
๐ŸงฎKolmogorov Bounds
RVFL-X: A Novel Randomized Network Based on Complex Transformed Real-Valued Tabular Datasets
arxiv.orgยท3d
๐Ÿ”Vector Forensics
Stress-Testing Model Specs Reveals Character Differences among Language Models
arxiv.orgยท2d
๐Ÿ“‹Document Grammar