Machine Code, Instruction Sets, Assembly Language, Low-Level Programming

The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.ai·1d·
🛡️Capability Security
C2|Q>: A Robust Framework for Bridging Classical and Quantum Software Development
arxiv.org·1d
🔬Nanopasses
Self-Extracting F3
buttondown.com·10h·
Discuss: Hacker News
📊Row Polymorphism
Obelisk 0.25.4 and handling of WASM traps
obeli.sk·15h·
🛡️Error Handling
PC cooler control with a $2 microcontroller, no development board
popovicu.com·2d·
Discuss: Hacker News
🔌Microcontrollers
Four years, Five failures, One compiler
daymare.net·1d·
🌱Minimal Languages
Toy Binary Decision Diagrams
philipzucker.com·1d
Type Checking
How To Build Effective Technical Guardrails for AI Applications
towardsdatascience.com·10h
🛡️Security Type Systems
Introduction to Python Module Two Part Four Data Types
dev.to·12h·
Discuss: DEV
🐍lisp
Event Handling: Automatic Event Bootstrapping
gitlab.com·13h·
Discuss: DEV
📡Protocol Buffers
Why We Need SIMD
parallelprogrammer.substack.com·1d·
Discuss: Substack
🔀SIMD Programming
The Mechanism of Mineral Nucleation and Growth in a Mini-Ferritin
pubs.acs.org·5h·
Discuss: Hacker News
Effect Inference
How we trained an ML model to detect DLL hijacking
securelist.com·20h
🏷️Memory Tagging
The Art of Abstraction — Polymorphic Memory Allocator
unboxthecat.medium.com·1h·
Discuss: r/cpp
🏗️Custom Allocators
Embracing the parallel coding agent lifestyle
simonw.substack.com·1d·
Discuss: Substack
Live Coding
Wasm 3.0: No Component Model and No ‘Docker Moment’
thenewstack.io·6h
🌐WASM Runtimes
Functional correctness -- Haskell-ing your way to reliable code (hackover2024)
cdn.media.ccc.de·7h
functional programming
My First Contribution to Linux
vkoskiv.com·15h·
💻Terminal Control
Superbase on the Commodore 64
stonetools.ghost.io·15h·
Discuss: Hacker News
💾Minimal Databases
Writing a Dictation Application
osada.blog·1d
📚Self-Documenting Code