Search results

According to the tag fun, the following results have been found:

Counting the number of tokens for LLM in the Linux kernel sources and beyond…

This article about the new extension of the transformer architecture – Titan from Google – that allows expanding the limits of LLM to 2 million tokens, prompted me to inquire how many tokens suitable for LLM are contained in the sources of colossal software.

Audit of smart contract security in TON: key mistakes and tips

Hello everyone! Sergey Sobolev is here, a specialist in distributed systems security at Positive Technologies, our team is engaged in auditing smart contracts. Today I will tell you about the results of our team's research and conclusions regarding the security audit of smart contracts in the FunC and Tact languages of the TON platform.

Breaking CityHash64, MurmurHash2/3, wyhash and more…

Hash functions are incredibly beautiful mathematical objects. They can map arbitrary data to a small range of fixed-size output data in such a way that the mapping is deterministic, yet appears random. This "deterministic randomness" is incredibly useful for a wide range of applications, such as hash tables, checksums, Monte Carlo algorithms, distributed algorithms without communication, and so on.

How we researched the energy efficiency of neural network inference on a tablet

Modern gadgets are unimaginable without AI functions. But they come at a cost that the end consumer has to "pay", including faster battery drain and device overheating. As a result, electronics manufacturers face a dilemma: features are needed, many of them, but without significant damage to the battery.

Games on industrial devices? Easy! We port emulators and Wolfenstein 3D to a TSD for $5.32 in practice

Disclaimer: the words used like "port", "hack" and "reverse" do not mean that the article is intended exclusively for geeks! I try to write so that it is understandable and interesting to absolutely everyone!

Top dangerous vulnerabilities of August: Microsoft Windows and WordPress sites are at risk

tekkix, hello! I am Alexander Leonov, leading expert of the PT Expert Security Center laboratory. Every month, my team of analysts at Positive Technologies researches information about vulnerabilities from vendor security databases and bulletins, social networks, blogs, telegram channels, exploit databases, and public code repositories, identifying trending vulnerabilities in all this diversity. These are the vulnerabilities that are either already being exploited or may be exploited in the near future.