Hacker News
@hackernewslive
24.6K
subscribers
216K
links
Download Telegram
Join
Hacker News
24.6K subscribers
Hacker News
The maths you need to start understanding LLMs
Article
,
Comments
Giles' Blog
The maths you need to start understanding LLMs
A quick refresher on the maths behind LLMs: vectors, matrices, projections, embeddings, logits and softmax.
👎
12
🥰
8
🤮
5
🌭
1
Hacker News
Let us git rid of it, angry GitHub users say of forced Copilot features
Article
,
Comments
The Register
Let us git rid of it, angry GitHub users say of forced Copilot features
: Unavoidable AI has developers looking for alternative code hosting options
❤
28
👍
7
🌭
3
Hacker News
What Is the Fourier Transform?
Article
,
Comments
Quanta Magazine
What Is the Fourier Transform?
Amid the chaos of revolutionary France, one man’s mathematical obsession gave way to a calculation that now underpins much of mathematics and physics. The calculation, called the Fourier transform, decomposes any function into its parts.
🥰
22
❤
2
👎
1
😁
1
🌭
1
Hacker News
Qwen3 30B A3B Hits 13 token/s on 4xRaspberry Pi 5
Article
,
Comments
GitHub
[v0.16.0] Qwen3 30B A3B Q40 on 4 x Raspberry Pi 5 8GB · b4rtaz distributed-llama · Discussion #255
qwen3_30b.mov Setup [
🔀
TP-Link LS1008G Switch] | | | | | | | |_______
🔸
raspberrypi2 (ROOT) 10.0.0.2 | | |_________
🔹
raspberrypi1 (WORKER 1) 10.0.0.1 | |___________
🔹
raspberrypi3 (WORKER 2) 10.0....
😁
11
🔥
10
❤
2
🤣
2
🤔
1
🤯
1
🌭
1
Hacker News
996
Article
,
Comments
Armin Ronacher's Thoughts and Writings
996
There is cost to your lifestyle.
😁
7
💯
2
🌭
1
Hacker News
We Hacked Burger King: How Auth Bypass Led to Drive-Thru Audio Surveillance
Article
,
Comments
💯
10
🆒
5
🌭
2
Hacker News
DuckDuckGo founder: AI surveillance should be banned
Article
,
Comments
Gabrielweinberg
AI surveillance should be banned while there is still time.
All the same privacy harms with online tracking are also present with AI, but worse.
💯
63
🔥
13
⚡
4
🤡
4
👍
3
❤
1
🌭
1
Hacker News
All New Java Language Features Since Java 21
Article
,
Comments
inside.java
All New Java Language Features Since Java 21 #RoadTo25
Java 25 ships with a number of new language features, many of which fit under the umbrella of data-oriented programming, on-ramping new developers, and making Java more viable as a noscripting language for easy automation. Join Jose as he explores the…
💩
18
🥰
6
🤡
2
🤬
1
🤮
1
🌭
1
🤣
1
😴
1
Hacker News
Mac Clones History: A Tale of Poor Margins and Bad Timing
Article
,
Comments
Tedium: The Dull Side of the Internet.
Mac Clones History: A Tale Of Poor Margins & Bad Timing
The ’90s-era Mac clone program, Apple’s attempt to revive its fortunes during its lowest era, had the opposite effect. But hey, it could have worked in 1985.
✍
2
🌭
1
Hacker News
Zuckerberg caught on hot mic promoting fake investment figures to support Trump
Article
,
Comments
Bluesky Social
Acyn (@acyn.bsky.social)
Zuckerberg saying Meta intends to spend at least 600 billion in the US
Zuckerberg at the end caught on a hot mic
😁
29
🤣
20
🤡
2
🌭
2
🤪
2
🤮
1
Hacker News
Why Language Models Hallucinate
Article
,
Comments
Openai
Why language models hallucinate
OpenAI’s new research explains why language models hallucinate. The findings show how improved evaluations can enhance AI reliability, honesty, and safety.
🥱
12
🤔
4
🤯
2
💩
2
🤣
2
🖕
2
😁
1
🌭
1
Hacker News
A Software Development Methodology for Disciplined LLM Collaboration
Article
,
Comments
GitHub
GitHub - Varietyz/Disciplined-AI-Software-Development: This methodology provides a structured approach for collaborating with AI…
This methodology provides a structured approach for collaborating with AI systems on software development projects. It addresses common issues like code bloat, architectural drift, and context dilu...
🤡
8
🤮
1
🌭
1
Hacker News
Realtek RTL8127 10GbE PCIe cards and M.2 modules are starting to show up
Article
,
Comments
❤
15
🌭
4
Hacker News
Zuckerberg Caught in Revealing Hot Mic Moment During White House Dinner
Article
,
Comments
PCMAG
Zuckerberg Caught in Revealing Hot Mic Moment During White House Dinner
After Mark Zuckerberg told President Trump that Meta would invest $600 billion by 2028, the CEO confessed to the president that he 'wasn't sure what number [Trump] wanted to go with.'
😁
30
🤡
11
🙊
7
🤷♂
2
🐳
2
🌭
1
Hacker News
Oldest Recorded Transaction
Article
,
Comments
avi.im
Oldest recorded transaction - blag
The oldest recorded transaction was in 3100 BC
🌭
6
🎅
1
Hacker News
Our love letter to Internet Relay Chat [video]
Article
,
Comments
YouTube
Internet Relay Chat.
Our love letter to Internet Relay Chat.
Want more content like this? Support our mission! Send us a Super Thanks and check out our Patreon + Discord community: https://www.patreon.com/serialport
Got some retro gear you want to donate? Get in touch with…
👍
12
❤
6
🥰
3
🌭
2
Hacker News
Kenvue stock drops on report RFK Jr will link autism to Tylenol during pregnancy
Article
,
Comments
CNBC
Kenvue stock drops 10% on report RFK Jr. will link autism to Tylenol use during pregnancy
HHS will release the report that could draw that link between the pain medication and autism this month, according to the Wall Street Journal.
🤣
23
🤡
5
👏
4
😁
3
🌭
2
❤
1
💊
1
Hacker News
Using Claude Code SDK to reduce E2E test time
Article
,
Comments
Substack
Using Claude Code SDK to Reduce E2E Test Time by 84%
Best of both worlds: Building an AI gatekeeper that knows exactly which tests to run for your code changes
💩
11
🌭
2
😇
1
Hacker News
U.S. Department of War
Article
,
Comments
U.S. Department of War
The Department of War is America's largest government agency. With our military tracing its roots back to pre-Revolutionary times, the department has grown and evolved with our nation.
🤡
84
🫡
30
🤮
12
💩
9
❤
2
👎
2
🤣
2
🖕
2
❤🔥
1
🌭
1
😎
1
Hacker News
The World War Two bomber that cost more than the atomic bomb
Article
,
Comments
Bbc
The World War Two bomber that cost more than the atomic bomb
The Boeing B-29 was the most advanced bomber of World War Two, and more expensive to design and build than the atomic bombs it dropped.
✍
12
👀
8
🤮
4
❤
3
🌭
1
Hacker News
How the "Kim" dump exposed North Korea's credential theft playbook
Article
,
Comments
DomainTools Investigations | DTI
Inside the Kimsuky Leak: How the “Kim” Dump Exposed North Korea’s Credential Theft Playbook - DomainTools Investigations | DTI
A rare and revealing breach attributed to a North Korean-affiliated actor, known only as “Kim” as named by the hackers who dumped the data, has delivered a new insight into Kimsuky (APT43) tactics, techniques, and infrastructure. This actor's operational…
🌭
6
TWeb.init({scrollToPost:'hackernewslive/209475'});