CA insurance crisis: Thousands to lose coverage as two more insurers withdraw
Hacker News
APRIL 18, 2024
px-captcha
This site uses cookies to improve your experience. By viewing our content, you are accepting the use of cookies. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country we will assume you are from the United States. View our privacy policy and terms of use.
Hacker News
APRIL 18, 2024
px-captcha
Hacker News
APRIL 18, 2024
Which A.I. system writes the best computer code or generates the most realistic image? Right now, there’s no easy way to answer those questions.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Communication
Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications
Manufacturing Sustainability Surge: Your Guide to Data-Driven Energy Optimization & Decarbonization
From Developer Experience to Product Experience: How a Shared Focus Fuels Product Success
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Communication
Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications
Manufacturing Sustainability Surge: Your Guide to Data-Driven Energy Optimization & Decarbonization
From Developer Experience to Product Experience: How a Shared Focus Fuels Product Success
Hacker News
APRIL 18, 2024
Electrons are everywhere. But what if it's the same one?
Hacker News
APRIL 18, 2024
Neuralink for your AI Agents. Contribute to Upsonic/Tiger development by creating an account on GitHub.
Hacker News
APRIL 18, 2024
Comments
Hacker News
APRIL 18, 2024
Ruling: Thumbprint scan is like a "blood draw or fingerprint taken at booking.
Hacker News
APRIL 17, 2024
"Randar" is an exploit for Minecraft which uses LLL lattice reduction to crack the internal state of an incorrectly reused java.util.Random in the Minecraft server, then works backwards from that to locate other players currently loaded into the world. - randar-explanation/README.
Hacker News
APRIL 18, 2024
The hackers say they have stolen 5.3 million records from the World-Check database, used by companies and banks for screening potential customers.
Hacker News
APRIL 18, 2024
It'll be pricier, but there are geopolitical benefits, says CEO
Hacker News
APRIL 18, 2024
President Reagan responds to a unique request for funding
Hacker News
APRIL 17, 2024
L. Ron Hubbard, Operation Midnight Climax, and stochastic terrorism—the race for mind control changed America forever.
Hacker News
APRIL 18, 2024
A web based mission control framework. Contribute to nasa/openmct development by creating an account on GitHub.
Hacker News
APRIL 18, 2024
Keeling Labs develops artificial intelligence to power the clean energy transition. We're building intelligent, distributed, self-optimizing systems for renewable energy.
Hacker News
APRIL 18, 2024
There's a very specific reputation I want to have on a team: "Nat helps me solve my problems. Nat get things I care about done.
Hacker News
APRIL 18, 2024
Build the future of AI with Meta Llama 3. Now available with both 8B and 70B pretrained and instruction-tuned versions to support a wide range of applications.
Hacker News
MARCH 11, 2024
Contribute to openai/transformer-debugger development by creating an account on GitHub.
Hacker News
MARCH 11, 2024
We introduce the first model-stealing attack that extracts precise, nontrivial information from black-box production language models like OpenAI's ChatGPT or Google's PaLM-2. Specifically, our attack recovers the embedding projection layer (up to symmetries) of a transformer model, given typical API access. For under $20 USD, our attack extracts the entire projection matrix of OpenAI's Ada and Babbage language models.
Hacker News
MARCH 11, 2024
Cosine-similarity is the cosine of the angle between two vectors, or equivalently the dot product between their normalizations. A popular application is to quantify semantic similarity between high-dimensional objects by applying cosine-similarity to a learned low-dimensional feature embedding. This can work better but sometimes also worse than the unnormalized dot-product between embedded vectors in practice.
Hacker News
MARCH 1, 2024
Mojo ? Language Syntax Highlighting for Vim. Contribute to ovikrai/mojo-syntax development by creating an account on GitHub.
Hacker News
MARCH 1, 2024
After decades of semi-secrecy, a commune for L.G.B.T.Q. nonconformists has slowly begun to join the mainstream.
Hacker News
MARCH 2, 2024
It was billed as "the place where chocolate dreams become reality" but became a worldwide sensation when the reality emerged.
Hacker News
MARCH 2, 2024
weather.gov 2.0. Contribute to weather-gov/weather.gov development by creating an account on GitHub.
Hacker News
MARCH 2, 2024
TUI is an ambiguous term, meaning either of 'terminal' or 'text' user interface. The difference is even more pronounced now, with chat interfaces and assistive tech. So let's stop calling TUIs 'text' and call them 'terminal'—by their real name. Reserving 'text' for more appropriate conversational UIs.
Hacker News
MARCH 2, 2024
How to use KeePassXC to sign your git commits using the git ssh signing feature
Hacker News
FEBRUARY 21, 2024
Comments
Hacker News
FEBRUARY 21, 2024
Comments
Hacker News
FEBRUARY 21, 2024
Inspired by the 1BR Challenge, I wanted to see how much it would cost to transfer 1 billion rows from Postgres to Snowflake. Moving 1 billion rows is no easy task. The process involves not just the transfer of data but ensuring its integrity, error r.
Hacker News
FEBRUARY 21, 2024
Comments
Hacker News
FEBRUARY 20, 2024
There are still no signs of a new X.
Hacker News
FEBRUARY 21, 2024
Diffusion models have achieved remarkable success in image and video generation. In this work, we demonstrate that diffusion models can also textit{generate high-performing neural network parameters}. Our approach is simple, utilizing an autoencoder and a standard latent diffusion model. The autoencoder extracts latent representations of a subset of the trained network parameters.
Hacker News
FEBRUARY 21, 2024
Last week Google introduced Gemini Pro 1.5, an enormous upgrade to their Gemini series of AI models. Gemini Pro 1.5 has a 1,000,000 token context size.
Hacker News
FEBRUARY 11, 2024
Programming languages come in all shapes and sizes. There are pretty simple languages and really complex ones. But what unites most of these languages is the syntax. There are many languages so-called C-like, as they share many syntax ideas with C language, which includes consistent indentation, grouping, scoping, and infix notation.
Hacker News
FEBRUARY 9, 2024
The chief hurdle in constructing a Death Star is not the energy, materials, or even knowledge needed. It’s the long time needed. A society can change their mind mid-way over centuries, and simply move on.
Hacker News
FEBRUARY 11, 2024
Introducing openFPGA. The future of video game preservation.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content