🌐 nimobeeren.com
📍 Eindhoven
Example: the word LIME in this image from the tutorial would never actually appear in a solution, because it requires crossing itself.
Example: the word LIME in this image from the tutorial would never actually appear in a solution, because it requires crossing itself.
This was the result of integrating strand crossing checks into the search, rather than post-filtering them.
This was the result of integrating strand crossing checks into the search, rather than post-filtering them.
Now I know how well it does at solving ~100 real puzzles: github.com/nimobeeren/s...
Pass rate of ~19% means there is work to be done!
Now I know how well it does at solving ~100 real puzzles: github.com/nimobeeren/s...
Pass rate of ~19% means there is work to be done!
This seems right, but where is gpt-5-main-mini? Is it just gpt-5-mini with reasoning effort set to minimal?
This seems right, but where is gpt-5-main-mini? Is it just gpt-5-mini with reasoning effort set to minimal?
From "There are Only 6 RAG Evals" jxnl.co/writing/2025...
From "There are Only 6 RAG Evals" jxnl.co/writing/2025...
I let my simple o4-mini agent have a go, not expecting much. But I was surprised! 👀
1/n
I let my simple o4-mini agent have a go, not expecting much. But I was surprised! 👀
1/n
Gemini taught me about Traefik which lets me run multiple apps on subdomains of localhost, didn't know that was possible!
Gemini taught me about Traefik which lets me run multiple apps on subdomains of localhost, didn't know that was possible!
cloud.langfuse.com/project/cmca...
cloud.langfuse.com/project/cmca...
I made a very simple agent that solves Capture-The-Flag (CTF) cybersecurity challenges. It's less than 100 lines of code and it has only one tool: making HTTP requests.
It was able to do several cookie spoofing and SQL injection attacks.
Check out what it did!
I made a very simple agent that solves Capture-The-Flag (CTF) cybersecurity challenges. It's less than 100 lines of code and it has only one tool: making HTTP requests.
It was able to do several cookie spoofing and SQL injection attacks.
Check out what it did!
Why did the t get stuck to the i? Where did its extra length come from? Does it hurt when it stretches like that?
Why did the t get stuck to the i? Where did its extra length come from? Does it hurt when it stretches like that?
Don't think I'll be using it immediately since it's not production-ready yet, but I don't mind that we're giving the multi-agent concept a little more shape.
developers.googleblog.com/en/a2a-a-new...
Don't think I'll be using it immediately since it's not production-ready yet, but I don't mind that we're giving the multi-agent concept a little more shape.
developers.googleblog.com/en/a2a-a-new...
spec.modelcontextprotocol.io/specificatio...
spec.modelcontextprotocol.io/specificatio...
Cheers to all the awesome people I met ✨
Can't wait until the next Summit (I heard Paris? 🥖)
Cheers to all the awesome people I met ✨
Can't wait until the next Summit (I heard Paris? 🥖)