0 bookmark(s) - Sort by: Date ↓ / Title /
Huginn is presented as a robust, open-source alternative to IFTTT, offering greater customization, privacy through self-hosting, and the ability to handle complex workflows with API integrations. While it requires more technical expertise than IFTTT, it provides significantly more power and control.
A popular and actively maintained open-source web crawling library for LLMs and data extraction, offering advanced features like structured data extraction, browser control, and markdown generation.
Docling is a powerful open-source library for document processing, supporting diverse formats and advanced PDF understanding, with seamless integrations with the gen AI ecosystem.
Powering the future of open-source AI agent development. Discover, run, and compose AI agents from any framework. Build production-grade AI agents in both Python and Typescript. Join our community on Discord, BlueSky, and YouTube.
A consortium of Cisco, Galileo, and LangChain proposes an open, scalable way to connect and coordinate AI across different frameworks, vendors, and infrastructure to manage the rapid evolution of AI agents.
Minimalist LLM Framework in 100 Lines. Enable LLMs to Program Themselves.
The article discusses four open-source AI research agents that serve as cost-effective alternatives to OpenAI’s Deep Research AI Agent. These alternatives offer robust search capabilities, AI-powered extraction, and reasoning features, allowing researchers to automate and optimize their workflows without incurring high costs.
A fully open reproduction of DeepSeek-R1. This repo is a work in progress, let's build it together!
This article discusses Time-MOE, an open-source time-series foundation model using Mixture-of-Experts (MOE) to improve forecasting accuracy while reducing computational costs. Key contributions include the Time-300B dataset, scaling laws for time series, and the Time-MOE architecture.
The article discusses how open-source Large Language Models (LLMs) are helping security teams to better detect and mitigate evolving cyber threats.
First / Previous / Next / Last
/ Page 1 of 0