Sat.Sep 07, 2024

article thumbnail

Building the Same App across Various Web Frameworks

Eugene Yan

Comparing five implementations built with FastAPI, FastHTML, Next.

363
363
article thumbnail

Protect AI Democratizes AI Security Training with Free MLSecOps Foundations Online Learning Course   

insideBIGDATA

Protect AI, a leading artificial intelligence (AI) and machine learning (ML) security company, announced the availability of MLSecOps Foundations, a free four part video training and certification program on how to build security into AI/ML led by its CISO Diana Kelley.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Post-Google World

Hacker News

Another Google antitrust trial starts on Monday. If Google loses, it'll be three strikes. At some point, they will give up and realize that the writing is on the wall for their current business model.

182
182
article thumbnail

UNLOCKING THE POWER OF BIG DATA

Women in Big Data

The Power of Big Data transcends the business sector. It moves beyond the vast amount of data to discover patterns and stories hidden inside. By leveraging big data, organizations and institutions can uncover valuable insights, predict trends, and make informed decisions that significantly influence their strategic directions and operational efficiencies.

article thumbnail

Whats New in Apache Airflow 3.0 –– And How Will It Reshape Your Data Workflows?

Apache Airflow® 3.0, the most anticipated Airflow release yet, officially launched this April. As the de facto standard for data orchestration, Airflow is trusted by over 77,000 organizations to power everything from advanced analytics to production AI and MLOps. With the 3.0 release, the top-requested features from the community were delivered, including a revamped UI for easier navigation, stronger security, and greater flexibility to run tasks anywhere at any time.

article thumbnail

GPT-fabricated scientific papers on Google Scholar

Hacker News

Academic journals, archives, and repositories are seeing an increasing number of questionable research papers clearly produced using generative AI. They are often created with widely available, general-purpose AI applications, most likely ChatGPT, and mimic scientific writing. Google Scholar easily locates and lists these questionable papers alongside reputable, quality-controlled research.

AI 181
article thumbnail

Baiting the Bots

Hacker News

LLM chatbots can be engaged in endless "conversations" by considerably simpler text generation bots. This has some interesting implications.

181
181

More Trending

article thumbnail

Ten Things to Know about the Great Wave

Hacker News

If not the most famous artwork in the world, it is certainly one of the most famous.

159
159
article thumbnail

CitizenDJ – Make music using free audio and video from the Library of Congress

Hacker News

Citizen DJ invites the public to make music using free-to-use audio and video collections. By embedding these materials in hip hop music, listeners can discover items in the library's vast collections that they likely would never have known existed.

154
154
article thumbnail

Hallelujah, Leonard Cohen, and a Pulitzer Prize-winning writer's suicide

Hacker News

Genius is fragile. Success, even more so. What does it mean then for an artist to fail?

154
154
article thumbnail

Gnome Files: A detailed UI examination

Hacker News

Comments

152
152
article thumbnail

What’s New in Apache Airflow® 3.0—And How Will It Reshape Your Data Workflows?

Speaker: Tamara Fingerlin, Developer Advocate

Apache Airflow® 3.0, the most anticipated Airflow release yet, officially launched this April. As the de facto standard for data orchestration, Airflow is trusted by over 77,000 organizations to power everything from advanced analytics to production AI and MLOps. With the 3.0 release, the top-requested features from the community were delivered, including a revamped UI for easier navigation, stronger security, and greater flexibility to run tasks anywhere at any time.

article thumbnail

Malaysia backtracks on DNS redirection decision

Hacker News

He stressed that cybercrime issues, such as gambling, prostitution and pornography websites, demand comprehensive solutions.

152
152
article thumbnail

Hindenburg's Interior: Photos Show What Luxury Air Travel Was Like in the 1930s

Hacker News

Before modern air travel and first-class suites, the grandest thing in luxury air travel was the German Zeppelin airship.

151
151
article thumbnail

An open discussion forum for ArXiv papers

Hacker News

Comment directly on top of arXiv papers.

140
140
article thumbnail

WebP: The WebPage Compression Format

Hacker News

Comments

137
137
article thumbnail

A Guide to Debugging Apache Airflow® DAGs

In Airflow, DAGs (your data pipelines) support nearly every use case. As these workflows grow in complexity and scale, efficiently identifying and resolving issues becomes a critical skill for every data engineer. This is a comprehensive guide with best practices and examples to debugging Airflow DAGs. You’ll learn how to: Create a standardized process for debugging to quickly diagnose errors in your DAGs Identify common issues with DAGs, tasks, and connections Distinguish between Airflow-relate

article thumbnail

FutureRack: Server racks are everywhere. Now you can find them in your home

Hacker News

Server racks as home furniture.

136
136
article thumbnail

Jeremy Couillard's video games capture what it's like to be alive

Hacker News

‘For better or worse, we’re stuck with each other. I think for the better.

129
129
article thumbnail

Minimal Web

Hacker News

Comments

125
125
article thumbnail

Cracking an old ZIP file to help open source the ANC's "Vula" secret crypto code

Hacker News

Comments

123
123
article thumbnail

Agent Tooling: Connecting AI to Your Tools, Systems & Data

Speaker: Alex Salazar, CEO & Co-Founder @ Arcade | Nate Barbettini, Founding Engineer @ Arcade | Tony Karrer, Founder & CTO @ Aggregage

There’s a lot of noise surrounding the ability of AI agents to connect to your tools, systems and data. But building an AI application into a reliable, secure workflow agent isn’t as simple as plugging in an API. As an engineering leader, it can be challenging to make sense of this evolving landscape, but agent tooling provides such high value that it’s critical we figure out how to move forward.

article thumbnail

Keyhole – Forge own Windows Store licenses

Hacker News

By WitherOrNot

119
119
article thumbnail

Appalachian Trail Hiker Photo Archive

Hacker News

Comments

117
117
article thumbnail

The PERQ Computer

Hacker News

Comments

117
117
article thumbnail

Microui+fenster=Small GUI

Hacker News

Sometimes I just want to put pixels on a screen. I don’t want to think about SDL this or OpenGL that—I just want to draw my pixel buffer and be done.

117
117
article thumbnail

How to Modernize Manufacturing Without Losing Control

Speaker: Andrew Skoog, Founder of MachinistX & President of Hexis Representatives

Manufacturing is evolving, and the right technology can empower—not replace—your workforce. Smart automation and AI-driven software are revolutionizing decision-making, optimizing processes, and improving efficiency. But how do you implement these tools with confidence and ensure they complement human expertise rather than override it? Join industry expert Andrew Skoog as he explores how manufacturers can leverage automation to enhance operations, streamline workflows, and make smarter, data-dri

article thumbnail

Richard Feynman and the Connection Machine

Hacker News

Comments

116
116
article thumbnail

Raspberry Pi Showcases Rust on the RP2350 Microcontroller

Hacker News

While C tends to be the go-to launguage for microcontrollers, Raspberry Pi is promoting the prospects of using Rust on their RP2350 microcontroller.

114
114
article thumbnail

A new rare high-rank elliptic curve, and an orchard of Diophantine equations

Hacker News

I got an email the other day from mathematician Bogdan Grechuk, whose book Polynomial Diophantine Equations: A Systematic Approach ([link] was recently released. This is to my mind a rather remarkable book.

113
113
article thumbnail

DEF Con 32 – AMD Sinkclose Universal Ring-2 Privilege Escalation (Not Redacted) [pdf]

Hacker News

Comments

110
110
article thumbnail

Automation, Evolved: Your New Playbook for Smarter Knowledge Work

Speaker: Frank Taliano

Documents are the backbone of enterprise operations, but they are also a common source of inefficiency. From buried insights to manual handoffs, document-based workflows can quietly stall decision-making and drain resources. For large, complex organizations, legacy systems and siloed processes create friction that AI is uniquely positioned to resolve.

article thumbnail

Show HN: I mapped HN's favorite books with GPT-4o

Hacker News

The 1000 most popular books on Hacker News visualized on an interactive map.

108
108
article thumbnail

DNS Doesn't Propagate (2021)

Hacker News

DNS "propagation" is actually caches expiring

106
106
article thumbnail

We don't trade with ants and why hypothetical AI:s won't, either

Hacker News

Comments

104
104
article thumbnail

Conservative GC can be faster than precise GC

Hacker News

Comments

102
102
article thumbnail

The Ultimate Guide to Apache Airflow DAGS

With Airflow being the open-source standard for workflow orchestration, knowing how to write Airflow DAGs has become an essential skill for every data engineer. This eBook provides a comprehensive overview of DAG writing features with plenty of example code. You’ll learn how to: Understand the building blocks DAGs, combine them in complex pipelines, and schedule your DAG to run exactly when you want it to Write DAGs that adapt to your data at runtime and set up alerts and notifications Scale you