Posts

Protecting Windows users from Janet Jackson’s Rhythm Na...

Granting an exception to a system policy. The post Protecting Windows users from...

Why did Windows 7, for a few months, log on slower if y...

It's waiting for Godot and eventually gives up. The post Why did Windows 7, for ...

If we can have std::atomic<std::shared_ptr>, why not st...

Controlling the reference count. The post If we can have std::atomic, why not st...

Using C++ type aliasing to avoid the ODR problem with c...

Still one definition, but two types. The post Using C++ type aliasing to avoid t...

Why does Windows have trouble finding my Win32 resource...

Disagreements over the fine print. The post Why does Windows have trouble findin...

Big Context Windows Are a Big Deal

Last week, I got my hands on Google’s newest generative model: Gemini 1.5, a mul...

Machine Learning's Most Useful Multitool: Embeddings

Embeddings are one of the most versatile techniques in machine learning, and a c...

You, Me, and My AI-Generated Alternate Identity

@azusagakuyuki is a young Japanese motorcyclist with long hair, a delicate chin,...

An Impractical Guide to AI on Google Cloud

Your manager holds a gun to the side of your head and says, “Sell me a Google Cl...

Build an Animal/Object Tracking Camera App with TensorF...

Introducing PetCam: a non-invasive machine-learning-powered pet tracker that run...

Transformers, Explained: Understand the Model Behind GP...

You know that expression When you have a hammer, everything looks like a nail? W...

How I, One Humble Engineer, Deal With Imposter Syndrome

Let me start this post off by saying that imposter syndrome has already been cov...

AI Dubs Over Subs? Translating and Dubbing Videos with AI

Alongside cooking for myself and walking laps around the house, Japanese cartoon...

DALL·E Explained in Under 5 Minutes

It seems like every few months, someone publishes a machine learning paper or de...

AlphaFold 2 Explained: A Semi-Deep Dive

At the end of last month, DeepMind, Google’s machine learning research branch kn...

The best Playdate games for 2025

Owning a Playdate comes with the perk of already having access to 24 games at no...

My X Account Was Hijacked to Sell a Fake WIRED Memecoin...

Earlier this year, a hacker used my X account to hawk a fraudulent WIRED-branded...

$25 Off DoorDash Promo Code | May 2025

Explore today’s top DoorDash promo codes for $25 off, free delivery, and up to 3...

Golden Chickens Deploy TerraStealerV2 to Steal Browser ...

The threat actors known as Golden Chickens have been attributed to two new malwa...

Malicious Go Modules Deliver Disk-Wiping Linux Malware ...

Cybersecurity researchers have discovered three malicious Go modules that includ...

Iranian Hackers Maintain 2-Year Access to Middle East C...

An Iranian state-sponsored threat group has been attributed to a long-term cyber...

U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomw...

The U.S. Department of Justice (DoJ) on Thursday announced charges against a 36-...

TikTok Slammed With €530 Million GDPR Fine for Sending ...

Ireland's Data Protection Commission (DPC) on Friday fined popular video-sharing...

How to Automate CVE and Vulnerability Advisory Response...

Run by the team at workflow orchestration and AI platform Tines, the Tines libra...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.