A disenshittification moment from the land of mass storage
doctorow.medium.com·1d
🧲Magnetic Philosophy
#16 Pronic, oblong, rectangular numbers.... Etymology and History of Math Terms
pballew.blogspot.com·19h·
λLambda Encodings
Show HN: We used LZMA to encode data into a URL
standardsapplied.com·8h·
Discuss: Hacker News
🌀Differential Geometry
Fast Matrix Multiply on an Apple GPU
percisely.xyz·4d·
SIMD Vectorization
The Absolute Minimum Every Developer Must Know About Unicode and Character Sets
joelonsoftware.com·3d·
Discuss: Hacker News
🔤Character Encoding
IBM Ships Homegrown “Spyre” Accelerators, Embraces Anthropic For AI Push
nextplatform.com·1d·
Discuss: Hacker News
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Operable Software
ferd.ca·1d·
Discuss: Hacker News
👁️System Observability
Loyca.ai – An open-source, local-first AI assistant with contextual awareness
github.com·8h·
Discuss: Hacker News
🌀Brotli Internals
Computational Complexity of Covering Two-vertex Multigraphs with Semi-edges
arxiv.org·2d
🕸️Graph Algorithms
A Proof of the Riemann Hypothesis
future.forem.com·2d·
Discuss: DEV
🎯Arithmetic Coding Theory
Curing Miracle Steps in LLM Mathematical Reasoning with Rubric Rewards
arxiv.org·1d
🧮Theorem Proving
Channel Simulation and Distributed Compression with Ensemble Rejection Sampling
arxiv.org·3d
Information Bottleneck
LLC Artificial Intelligence Trained to Lie by Omission
dev.to·12h·
Discuss: DEV
📏Code Metrics
Automated Anomaly Detection in Time-Series Statistical Spreadsheets via Hyperdimensional Vector Similarity
dev.to·1d·
Discuss: DEV
🔤Character Classification
🚀 From Rejection to Reinvention: How I Built an AI That Finds My Jobs
dev.to·21h·
Discuss: DEV
🇨🇳Chinese Computing
Using AWS Identity Center (SSO) tokens to script across multiple accounts
dev.to·13h·
Discuss: DEV
🎫Kerberos Exploitation
ACE: Attribution-Controlled Knowledge Editing for Multi-hop Factual Recall
arxiv.org·1d
Effect Handlers
**The Quantum Leap in Neural Networks: Revolutionizing Compu
dev.to·8h·
Discuss: DEV
🕸️Tensor Networks
Real-time Anomaly Detection in Financial Transactions via Hybrid Reinforcement Learning and Graph Neural Networks
dev.to·9h·
Discuss: DEV
🔍Vector Forensics
Evaluating Fundus-Specific Foundation Models for Diabetic Macular Edema Detection
arxiv.org·2d
🌀Riemannian Computing