Tootfinder

Opt-in global Mastodon full text search. Join the index!

No exact results. Similar results found.

This piece was created while the apartheid government of South Africa was forcibly removing Coloured families from their homes as part of the destruction of District Six.
#mannenberg #southafrica #amf

@askesis@qoto.org
2025-06-20 22:04:24

Mais um motivo para sair das #bigtechs ...
Do Vale do Silício Š Reserva do Exército: CTOs de Gigantes Tech Alistam-se para a Defesa dos EUA

@arXiv_csCL_bot@mastoxiv.page
2025-06-19 08:14:54

The Compositional Architecture of Regret in Large Language Models
Xiangxiang Cui, Shu Yang, Tianjin Huang, Wanyu Lin, Lijie Hu, Di Wang
arxiv.org/abs/2506.15617

@iam_jfnklstrm@social.linux.pizza
2025-06-19 07:08:45

UNRWA - jag tycker att deras stöd är viktigt. Om du också tycker att det är dåligt att Sverige, tillsammans med Trump, inte ger stöd till dem så kan du skriva under Skiftets namninsamling

@arXiv_csSE_bot@mastoxiv.page
2025-06-19 08:36:43

Program Feature-based Fuzzing Benchmarking
Miao Miao
arxiv.org/abs/2506.15088 arxiv.org/pdf/2506.15088

@arXiv_mathph_bot@mastoxiv.page
2025-06-19 09:36:08

The large $N$ factorization does not hold for arbitrary multi-trace observables in random tensors
Razvan Gurau, Felix Joos, Benjamin Sudakov
arxiv.org/abs/2506.15362

David Barton isn’t just a primary pitchman for the Ten Commandments law in Texas
His fingerprints appear on 28 bills that have cropped up before the legislatures in 18 states this year.
A data analysis of the bills exposes how their language, structure and requirements are inherently identical.
In dozens of instances, they match model legislation pitched by Barton verbatim.
At the Texas hearing, Barton’s eyes fixated on the cover of the rare 1782 Aitken Bible.

Source identifiers are used to track your activity on a site:
Where you came from, what device you use, and even who you talk to.
Whether it's written clearly in the url or tied to a random string of characters, it's assigned to your activity.
When you send a link containing a source identifier to somebody and they click it, it signals to the website that you two are connected.
And that data goes right back to the website operators, and thus their advertisers…

The image features a graphic warning about the importance of removing source identifiers from links. 
It highlights examples of such identifiers in URLs, explaining how they are used to track user activity online. 
The text emphasizes the potential privacy concerns associated with sharing links containing these identifiers

As U.S. immigration officials seek to arrest more than a million people this year,
an army of plainclothes law enforcement agents has dispersed across the country.
They arrive in unmarked vehicles while only their eyes peek out from a balaclava.
Their bulletproof vests may identify them as “police” or a “federal agent” -- but often offer no hint as to their agency or division.
They arrest workers atgrocery stores and car washes and detain people near churches.
T…

Many people are detained at U.S. airports for reasons they find arbitrary and mysterious.
I got lucky—when I was stopped by Customs and Border Protection last week, after flying to Los Angeles from Melbourne, a border agent told me, explicitly and proudly, why I’d been pulled out of the customs line.
“Look, we both know why you are here,” the agent told me.
He identified himself to me as Adam, though his colleagues referred to him as Officer Martinez.
When I said that…