The Law of Leaky Abstractions
joelonsoftware.com·19h·
Discuss: Hacker News
🦀Rust
Flag this post
Simulating Clifford Circuits with Gaussian Elimination
arxiv.org·21h
🦀Rust
Flag this post
Designing Blockchain #1: Introduction
dev.to·12h·
Discuss: DEV
🦀Rust
Flag this post
Designing Data-Intensive Applications — Chapter 2: Data Models and Query Languages
dev.to·4h·
Discuss: DEV
🦀Rust
Flag this post
The Myth of RAM (2014)
ilikebigbits.com·1d·
Discuss: Hacker News
🦀Rust
Flag this post
Will I Make It to the Restaurant Before the Soup Dumplings Get Cold?
distributedthoughts.org·6h·
Discuss: Hacker News
🦀Rust
Flag this post
GHOST: Solving the Traveling Salesman Problem on Graphs of Convex Sets
arxiv.org·21h
🦀Rust
Flag this post
The Underwear Fixed Point
notes.hella.cheap·1d·
🦀Rust
Flag this post
Show HN: 3D Rubik's Cube Speed Cubing in the Browser
rubiks-cube-sandy.vercel.app·20h·
Discuss: Hacker News
🍳cooking
Flag this post
Stability of 0-dimensional persistent homology in enriched and sparsified point clouds
arxiv.org·21h
🦀Rust
Flag this post
Lossless Compression with Asymmetric Numeral Systems (2020)
bjlkeng.io·1d·
Discuss: Hacker News
🦀Rust
Flag this post
Bandits in Your LLM Gateway
tensorzero.com·10h·
Discuss: Hacker News
🦀Rust
Flag this post
What’s Special about Life? Bulk Orchestration and the Rulial Ensemble in Biology and Beyond
writings.stephenwolfram.com·11h·
Discuss: Hacker News
🦀Rust
Flag this post
New Fast Date Algorithms Pt 2 - Overflow Safe
benjoffe.com·1d·
Discuss: r/cpp
🦀Rust
Flag this post
The Complete Guide to Building Data Pipelines That Don’t Break
kdnuggets.com·11h
🦀Rust
Flag this post
Show HN: Steadykey – Deterministic Idempotency Keys with Pluggable Stores
npmjs.com·2d·
Discuss: Hacker News
🦀Rust
Flag this post
Scaling HNSWs
simonwillison.net·2h
🦀Rust
Flag this post
Different Ways to Count
github.com·1d·
Discuss: DEV
🦀Rust
Flag this post
Modern perspectives in proof theory (2023)
pmc.ncbi.nlm.nih.gov·2d·
Discuss: Hacker News
🦀Rust
Flag this post