mhofherr's Top FindsLoading...
AI for Data Analytics – Everything you need to know
exasol.com·1d·
Discuss: Hacker News
Flag this post
Give this worker a raise
i.redd.it·19h·
Flag this post
XDP: The Kernel-Level Powerhouse Behind Modern Network Defense
dev.to·6h·
Discuss: DEV
Flag this post
Building Our Gen AI Sales Knowledge Assistant on Snowflake
medium.com·21h·
Discuss: Hacker News
Flag this post
Commvault Expands End-to-End Identity Resilience: Detect, Log, and Reverse Hard-to-Detect Threats in Active Directory
prnewswire.com·4h
Flag this post
“It keeps me awake at night”: machine-learning pioneer on AI’s threat to humanity
nature.com·6h
Flag this post
Integrating Machine Learning into Physical Security Architecture
cacm.acm.org·22h
Flag this post
Whisper Leak side-channel attack bad actors access sensitive LLM conversations
scworld.com·1h·
Discuss: Hacker News
Flag this post
MongoDB Query Optimization: How I Reduced Response Time from 2 Seconds to 200ms
dev.to·1h·
Discuss: DEV
Flag this post
Using Custom Resources To Make Items, Creatures, Characters, Etc.
reddit.com·1h·
Discuss: r/godot
Flag this post
MonoCLUE : Object-Aware Clustering Enhances Monocular 3D Object Detection
arxiv.org·14h
🧠PKM Systems
Flag this post
A Photomicrographic Dataset of Rocks for the Accurate Classification of Minerals
nature.com·1d
Flag this post
Duality-based Mode Operations and Pyramid Multilayer Mapping for Rhetorical Modes
arxiv.org·1d
🧠PKM Systems
Flag this post
Quantification and object perception in Multimodal Large Language Models deviate from human linguistic cognition
arxiv.org·14h
Flag this post
Why Language Models Are “Lost in the Middle”
pub.towardsai.net·1d
🧠PKM Systems
Flag this post
Beyond Softmax: Dual-Branch Sigmoid Architecture for Accurate Class Activation Maps
arxiv.org·1d
🧠PKM Systems
Flag this post
Sign up or login to customize your feed and get personalized topic recommendations
Slowly Turning My Final Fantasy 14 Project Planning Towards The Next Patch
broken-words.com·1d
Flag this post
NEWS ROUNDUP – 10th November 2025
digitalforensicsmagazine.com·2d
🛡Cyber Security
Flag this post
From Pandas to Upstream Control: The Evolution PyData Needs Next
dev.to·19h·
Discuss: DEV
Flag this post