Nice on Friday, Potential snowflakes on Saturday
ketv.comยท12h
๐Ÿฆ€Rust
Flag this post
Learning to trust with Hanabi
bojidar-bg.devยท3h
๐Ÿ”’Security
Flag this post
Added lazy loading to all images.
threadreaderapp.comยท2h
๐Ÿฆ€Rust
Flag this post
Masked Softmax Layers in PyTorch
mcognetta.github.ioยท4dยท
Discuss: Hacker News
๐Ÿ’ฅExploit Development
Flag this post
Learning an Image Editing Model without Image Editing Pairs
paperium.netยท20hยท
Discuss: DEV
๐ŸŒBrowser Exploitation
Flag this post
Russian hackers use fake CAPTCHA tests to spread new malware families across multiple targets
foxnews.comยท5h
๐ŸŒBrowser Exploitation
Flag this post
How to Set Up Valkey, The Alternative to Redis
percona.comยท2h
๐Ÿ’ฅExploit Development
Flag this post
Once upon a time this blog was powered by make
refp.seยท10hยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
Study explains why ChatGPT and other AI models hate to say โ€˜I donโ€™t knowโ€™
nordot.appยท6h
๐Ÿฆ€Rust
Flag this post
Building a P2P Rental Marketplace - Full-Stack Architecture with Flutter & Express.js
revolvo.techยท2dยท
Discuss: DEV
๐ŸŒBrowser Exploitation
Flag this post
Tuesday 18 November 2025
informatics.ed.ac.ukยท1d
๐Ÿ”Reverse Engineering
Flag this post
Accumulating Context Changes the Beliefs of Language Models
lm-belief-change.github.ioยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
Auto-Detecting CSV Schemas for Lightning-Fast ClickHouse Ingestion with Parquet
dev.toยท8hยท
Discuss: DEV
๐Ÿ”ฌStatic Analysis
Flag this post
Ticked Off! @Christmas decorations
orlandosentinel.comยท4h
๐ŸŒBrowser Exploitation
Flag this post
Okay Not O.K.
reddit.comยท9hยท
๐Ÿ”’Security
Flag this post
Using the probabilistic method to bound the performance of toy transformers by Alex Gibson
greaterwrong.comยท17h
๐Ÿฆ€Rust
Flag this post
5 Sweaters That Would Make Truly Excellent Gifts
nytimes.comยท2h
๐Ÿ”’Security
Flag this post