TL;DR summary of stories on the internet
The NIST SP 800-108 is a type of publication that delves into key derivation using pseudorandom functions. In a recent update to the standard, a security issue was discovered by Amazon’s cryptographers, leading to the addition of a new section addressing Key Control Security. The attack against the initial design highlights the vulnerability when using […]
Read more »
State-space models (SSMs) were thought to potentially outperform transformers in language models due to their similar architecture to recurrent neural networks. However, a study by Merrill & Sabharwal in 2023 disproved this notion. Contrary to expectations, SSMs do not have a significant advantage over transformers in state tracking capabilities. Experimental results indicate that SSMs struggle […]
In this insightful article, the author delves into the importance of continuous monitoring of systems using tools like Checkly and Coralogix to identify issues that traditional testing may not catch. By implementing OpenTelemetry monitoring and identifying a latency issue with housekeeping tasks, the team was able to make a small fix that resulted in significant […]
Ice is a dynamic menu bar management tool designed to hide and show menu bar items while offering a range of additional features. It is continuously evolving, with some features still in development. To use Ice, simply Command + drag your menu bar items for easy rearrangement. You can manually install Ice by downloading the […]
The underwater noise from ships in the Mediterranean Sea has significantly increased, affecting the lives of marine organisms that rely on sound for survival. Authored by Amorina Kingdon, her book, “Sing Like Fish: How Sound Rules Life Under Water,” explores the impact of this noise on marine ecosystems. In locations like the St. Lawrence River, […]
Autoregressive models like the GPT family typically use a fixed left-to-right order to generate sequences, but this paper challenges that norm. By adding a positional encoding for the output, the order can be adjusted per sample, offering advantages like sampling and conditioning on specific tokens. The method also allows for dynamic sampling of multiple tokens […]
The article discusses the internal workings of OpenAI’s GPT-4o model, focusing on how images are represented as embedding vectors. The author delves into hypothetical designs for a CNN architecture that could achieve this representation, debating different strategies such as raw pixels versus using a convolutional neural network like YOLO. An experiment is conducted to test […]
During the Renaissance, hand gestures in art were as important as faces, conveying secrets, codes, and messages. An unusual hand gesture with tight third and fourth fingers and separated second and fifth fingers puzzled experts. The gesture was not related to known symbols like Masonic signs, religious gestures like Loyolan penance, or hand recognition among […]
The author shares a joke about Rust pointers on Twitter, focusing on ASLR (Address Space Layout Randomization) and the potential dangers of memory safety bugs. The program showcased in the joke demonstrates how the address of the main function can be observed and used as a random value, highlighting the limitations of using ASLR for […]
lsix is a tool similar to ls, but for images. It displays thumbnails in the terminal using sixel graphics, detecting terminal background color and supporting multiple image formats. Expanding GIFs show all frames in a montage. Features include inline SIXEL graphics, color quality improvement, and adjusting tiles per row based on window width. Installation involves […]