869 private links
Nice 8x8 bitmap fonts freely available.
A really interesting demo on visualizing on perplexity of a LLM. I knew about perplexity metric from the theory, where it's the average log-likelihood for the distribution of current tokens given previous tokens. The demo makes the idea more intuitive by showing the perplexity for each token and how they're calculated.
Self-hostable client side PDF tool set.
Search Wikipedia entries by meaning. It builds an embedding database for each Wikipedia articles. The search is done locally in the browser with onnx sentence transformer. The author has a post on how it was made possible with quantization to compact millions of vectors to manageable size (megabytes) for offline use.
Turns out there are, expectedly, people who look for alternative to Calibre. This is a comprehensive post listing the replacement for various features of Calibre.
I currently don't have a satisfactory solution yet.
Another iceberg explain post, this time for postgres!
A quick and easy to remember estimation.
Explore ffmpeg filters visually via a node editor.
Interesting negotiating tips.
A rather interesting short article on the tidbits in early Linux source code.
During World War II, the British developed covert radar technology enabling night plane interceptions, masking it with a propaganda campaign attributing pilots' success to consuming more carrots for improved eyesight.
The author invented the neologism "Carrot Problem" to refer to this type of false excuses people use to hide the true cause to their success.
A gallery of embeddings for Stable Diffusion concepts.
A music keyboard that creates consonants for you automatically.
A visual and interactive explanation on how grokking (understanding) emerges in neuron networks.
What fascinates me is that the vast difference in neuron connectivity during memorizing and generalizing looks not unlike a human's brain in development.
Two attacks to make send traffic outside protected VPN tunnel.
- exploit VPN's LAN direct access mechanism by spoofing fake IP for target.com
- spoof the IP for VPN server
I reckon these methods should only affect unencrypted traffic or TLS without proper CN checks. Interestingly, this technique is used by some VPN software in China as an alternative way to selectively route traffic to VPN (to circumvent internet censorship). https://dreamacro.github.io/clash/configuration/dns.html#fake-ip
This thing amazes me when I saw it. Although I can roughly see how it may work, this still feels magical to me.
Then I realized, isn't this technique known as "inverse kinematics"?
Raku is indeed the successor of the Perl I loved :)
A clever albeit useless bash trick.
If you have two source of measurements, how can you combine them to get a more accurate measurement?
In short, you take the weighted average with the weight=1/variance.
Please also read https://news.ycombinator.com/item?id=36971975 for the missing (but important) bits.
ffmpeg cheatsheet.