The Transformer and the Hash
lesswrong.com·1h
🗂️Columnar Storage
Flag this post
Christoph Breitkopf: Interval Tables in Common Lisp
bokesan.blogspot.com·6h
🧮Algorithms
Flag this post
One Weird Hashing Trick
🗂️Columnar Storage
Flag this post
Cooking ic-dbms-canister: The journey begins
blog.veeso.dev·9h
🗂️Columnar Storage
Flag this post
Space-Efficient and Output-Sensitive Algorithms for the Longest Common Bitonic Subsequence
arxiv.org·16h
🧮Algorithms
Flag this post
First-class custom smart pointers
🧮Hindley-Milner
Flag this post
Biometric Key Derivation for Decentralized Identity Using Fuzzy Extractors
🧩Constraint Programming
Flag this post
Digit stealer: a JXA-based infostealer that leaves little footprint
jamf.com·6h
🧮Hindley-Milner
Flag this post
Today, we're excited to announce SLH-DSA-B.
threadreaderapp.com·2d
🧩Constraint Programming
Flag this post
Show HN: FPGA Based IBM-PC-XT
🗂️Columnar Storage
Flag this post
PostgreSQL: MD5 password support is deprecated – updating the user passwords
dan.langille.org·5h
🗄Databases
Flag this post
Building a Hypercube Interpolator (in Rust)
🧮Algorithms
Flag this post
.NET: Avoid Using Guid.CreateVersion7
🗂️Columnar Storage
Flag this post
Python Security Guide: Password Hashing, Encryption, Digital Signatures, and Secure Coding Practices
🧩Constraint Programming
Flag this post
Loading...Loading more...