Title TBA
usenix.org·1d
📄PostScript
How the Math That Powers Google Foresaw the New Pope
scientificamerican.com·1h
⚖️Feed Ranking
GitHub Copilot 'CamoLeak' AI Attack Exfiltrates Data
darkreading.com·1d
🚀Indie Hacking
How we built a structured Streamlit Application Framework in Snowflake
about.gitlab.com·1d
🌊Streaming Systems
CodeSOD: A JSON Serializer
thedailywtf.com·2d
📦Deflate
Fighting Email Spam on Your Mail Server with LLMs — Privately
cybercarnet.eu·11m·
gRPC
Laion, the dataset behind Stable Diffusion (2023)
deeplearning.ai·7h·
Discuss: Hacker News
🎓Academic Torrents
The People Rescuing Forgotten Knowledge Trapped On Old Floppy Disks
it.slashdot.org·15h
💽Floppy disks
Automated Anomaly Detection in Time-Series Statistical Spreadsheets via Hyperdimensional Vector Similarity
dev.to·16h·
Discuss: DEV
🔤Character Classification
Cache smuggling: When a picture isn't a thousand words
expel.com·2d·
Discuss: Hacker News
💣ZIP Vulnerabilities
Show HN: Using an LLM to sensibly sort a shopping receipt
treblig.org·2d·
Discuss: Hacker News
🔗Constraint Handling
OCaml 5.4 Release: New Features, Fixes, and More
tarides.com·6h·
🔗Functional Compilers
Faking a Rational Design Process in the AI Era: Why Documentation Matters
albertsikkema.com·1d·
Discuss: Hacker News
⚙️Proof Engineering
Effective and Stealthy One-Shot Jailbreaks on Deployed Mobile Vision-Language Agents
arxiv.org·1d
🕵️Vector Smuggling
Static Bundle Object: Modernizing Static Linking
medium.com·3d·
🔗Static Linking
Exposing Citation Vulnerabilities in Generative Engines
arxiv.org·2d
📜Digital Philology
LINQ and Learning to Be Declarative
nickstambaugh.dev·1d·
Discuss: Hacker News
🔗Concatenative Programming
The Automatic Door System: With Statements Explained
dev.to·2d·
Discuss: DEV
🧠Program Logic
LoRA Explained: Faster, More Efficient Fine-Tuning with Docker
docker.com·2d
💻Local LLMs
Access Control Policy Generation from High-Level Natural Language Requirements
dl.acm.org·2d·
Discuss: Hacker News
🔒Language-based security