Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.comยท2d
๐Ÿ›กCybersecurity
RSS feed in an Astro blog
amanhimself.devยท21h
๐Ÿ“ฐRSS Feed Discovery
Leopard Lord (1983)
bluerenga.blogยท3h
๐Ÿ•น๏ธRetro Gaming
Thumbing through the DNS Trail of the TAOTH Campaign
circleid.comยท1d
๐Ÿ“กDNS Archaeology
A small number of samples can poison LLMs of any size
anthropic.comยท3dยท
๐Ÿ”Vector Forensics
Sandy Maguire: Theorems for Free Redux
reasonablypolymorphic.comยท3dยท
Discuss: Hacker News
ฮปLambda Encodings
Why Haskell is the perfect fit for renewable energy tech
mrcjkb.devยท4dยท
Discuss: Hacker News
๐ŸงฌFunctional Programming
Reverse Engineering keyboard firmware with Ghidra
blog.usedbytes.comยท4dยท
Discuss: Hacker News
๐Ÿ”“Reverse engineering
The Bit Shift Paradox: How "Optimizing" Can Make Code 6ร— Slower
hackernoon.comยท4d
๐ŸงฎCompute Optimization
ACMID: Automatic Curation of Musical Instrument Dataset for 7-Stem Music Source Separation
arxiv.orgยท2d
๐ŸŽตAudio Formats
Beyond Vector Search: Building a RAG That *Actually* Understands Your Data
dev.toยท3dยท
Discuss: DEV
๐Ÿ—‚๏ธVector Databases
The Library Method: Understanding @cache
dev.toยท2dยท
Discuss: DEV
โšกCache Theory
Automated Comet Debris Trajectory Prediction via Ensemble Kalman Filtering & Particle Swarm Optimization
dev.toยท3hยท
Discuss: DEV
๐Ÿ‘๏ธObservatory Systems
LLC Artificial Intelligence Trained to Lie by Omission
dev.toยท1dยท
Discuss: DEV
๐Ÿ“Code Metrics
Nearly Instance-Optimal Parameter Recovery from Many Trajectories via Hellinger Localization
arxiv.orgยท3d
๐ŸงฎKolmogorov Bounds
RVFL-X: A Novel Randomized Network Based on Complex Transformed Real-Valued Tabular Datasets
arxiv.orgยท3d
๐Ÿ”Vector Forensics
Stress-Testing Model Specs Reveals Character Differences among Language Models
arxiv.orgยท2d
๐Ÿ“‹Document Grammar
Krish Naik: Complete RAG Crash Course With Langchain In 2 Hours
dev.toยท1hยท
Discuss: DEV
๐Ÿ“ŠMulti-vector RAG
A Study of Neural Polar Decoders for Communication
arxiv.orgยท6d
๐Ÿง Neural Codecs