Tootfinder

Opt-in global Mastodon full text search. Join the index!

No exact results. Similar results found.
@heiseonline@social.heise.de
2026-02-06 17:00:15

Noch ein paar der zuletzt hier besonders häufig geteilten #News:
IT-Angriff betrifft IT der Beweisstückstelle der Polizei

@burger_jaap@mastodon.social
2026-01-07 15:08:08

The year starts with a new competition case re. public EV charging prices in Italy. The competition authority has decided to conduct a further investigation into A2A Mobility, as prices charged to others were higher than in their own app.
agcm.it/pubblicazioni/bolletti<…

Figura n. 2: confronto prezzi all’ingrosso e al dettaglio del Gruppo A2A - Gennaio 2025 (ancora
in vigore a Novembre 2025)
— 0
Corrispetivo all ngrosso Pricing app A2A Delta % vs pricing app 2A Abbonamento mensile app A2A BEEBE SED
verso [omissis] mensile
AC 0.77 0.65 -18% 0.63 -23%)
DC 0.84 0.72 17% 0.63 -34%
Abbonamento mensile per clienti commodity A2A Abbonamento mensile per NON clienti commodity A2A
[ Timporto mensile CB A2A Tarifa flat CB A2A €/kWh Tariffa flat prospect €kWh
Small
Medium
…
Tabella n. 1: prezzi all’ingrosso e prezzi al dettaglio PPU del Gruppo A2A
AC DC
Prezzi su piattaforma e-roaming (IVA inclusa) 0,77 0,84
Prezzi con integrazione OCPI26 (IVA inclusa) 0,77 0,84
Prezzi al dettaglio in app proprietaria (IVA inclusa) 0,56 0,86
screenshot of AGCM website
@heiseonline@social.heise.de
2026-02-06 10:27:09

Wenn Cybercrime zeigt, dass wirklich niemand verschont bleibt. 🫠 Ein Ransomware-Angriff auf die Werkstatt Bremen hat auch Auswirkungen auf die IT-Systeme der polizeilichen Beweisstückstelle.
Zum Artikel: heise.de/-11165825?wt_mc=sm.re

Im Bild sieht man eine Hand an einer Tastatur. Im Bild steht: "Tatwerkzeuge sicher, Computer nicht
IT-Angriff trifft Beweisstückstelle der Polizei in Bremen" darunter steht: "Nach einem Ransomware-Angriff auf die Werkstatt Bremen ist auch die IT der polizeilichen Beweisstückstelle betroffen. Die Staatsanwaltschaft hat Ermittlungen aufgenommen."
@metacurity@infosec.exchange
2026-03-04 19:06:21

"A pair of US lawmakers are calling for an investigation into how easily spies can steal information based on devices’ electromagnetic and acoustic leaks—a spying trick the NSA once codenamed TEMPEST"
wired.com/story/how-vulnerable

@heiseonline@social.heise.de
2026-02-05 16:45:15

Einige der zuletzt hier besonders häufig geteilten #News:
IT-Angriff betrifft IT der Beweisstückstelle der Polizei

@deprogrammaticaipsum@mas.to
2026-01-04 14:54:53

"Christopher Bishop’s 2006 book “Pattern Recognition and Machine Learning,” arguably one of the triggers of the current popularity of machine learning, is quite literally a book about applied mathematics, diving into probabilities, linear algebra, neural networks, Markov models, and combinatorics. And rightfully so; if your objective is to find a job as an engineer at OpenAI, knowing a thing or two about eigenvalues and eigenvectors is definitely going to be useful."

@johnleonard@mastodon.social
2026-03-02 13:41:48

Rebuilding public trust in AI requires meaningful citizen engagement, transparent governance, and robust legislation. Technology itself is not the problem. The issue is that few people trust institutions to deploy it wisely and for their benefit. This makes the first step to answer the following question: What’s it in for me?

@azonenberg@ioc.exchange
2026-02-02 16:01:42

So, I have an answer to my previous question about GPU transfer efficiency.
Original code: write data to staging buffer on CPU, vkCopyBuffer to GPU local memory, run int-float32 conversion on GPU out of that buffer. The copy operation shows 50% SM occupancy by compute warps, 50% unallocated warp slots in active SMs.
GPU memory write bandwidth is sitting around 2%, about 1.9 ms copy/shader run time.

NSight Systems plot of shader execution time
@kexpmusicbot@mastodonapp.uk
2026-02-03 14:13:03

🇺🇦 #NowPlaying on #KEXP's #Early
Confidence Man:
🎵 Angry Girl
#ConfidenceMan
confidenceman.bandcamp.com/tra
open.spotify.com/track/2PXULQ9

@arXiv_csOS_bot@mastoxiv.page
2026-02-04 07:41:57

ProphetKV: User-Query-Driven Selective Recomputation for Efficient KV Cache Reuse in Retrieval-Augmented Generation
Shihao Wang, Jiahao Chen, Yanqi Pan, Hao Huang, Yichen Hao, Xiangyu Zou, Wen Xia, Wentao Zhang, Haitao Wang, Junhong Li, Chongyang Qiu, Pengfei Wang
arxiv.org/abs/2602.02579 arxiv.org/pdf/2602.02579 arxiv.org/html/2602.02579
arXiv:2602.02579v1 Announce Type: new
Abstract: The prefill stage of long-context Retrieval-Augmented Generation (RAG) is severely bottlenecked by computational overhead. To mitigate this, recent methods assemble pre-calculated KV caches of retrieved RAG documents (by a user query) and reprocess selected tokens to recover cross-attention between these pre-calculated KV caches. However, we identify a fundamental "crowding-out effect" in current token selection criteria: globally salient but user-query-irrelevant tokens saturate the limited recomputation budget, displacing the tokens truly essential for answering the user query and degrading inference accuracy.
We propose ProphetKV, a user-query-driven KV Cache reuse method for RAG scenarios. ProphetKV dynamically prioritizes tokens based on their semantic relevance to the user query and employs a dual-stage recomputation pipeline to fuse layer-wise attention metrics into a high-utility set. By ensuring the recomputation budget is dedicated to bridging the informational gap between retrieved context and the user query, ProphetKV achieves high-fidelity attention recovery with minimal overhead. Our extensive evaluation results show that ProphetKV retains 96%-101% of full-prefill accuracy with only a 20% recomputation ratio, while achieving accuracy improvements of 8.8%-24.9% on RULER and 18.6%-50.9% on LongBench over the state-of-the-art approaches (e.g., CacheBlend, EPIC, and KVShare).
toXiv_bot_toot