Using eBPF to attribute packet drops to netfilter rules
developers.redhat.com·4d
🪤Trap Handlers
Flag this post
Accelerating LLM inference with speculative decoding: Lessons ...
linkedin.com·1d
⚡Tokenizer Optimization
Flag this post
The Spegling Chronicles: Measuring dev shadow work until it measured us back
🏺Code Archeology
Flag this post
Modular: PyTorch and LLVM in 2025 — Keeping up With AI Innovation
modular.com·1d
⚙️Compilers
Flag this post
PAINT25 Invited Talk transcript: “Notational Freedom via Self-Raising Diagrams”
programmingmadecomplicated.wordpress.com·3d
📚Self-Documenting Code
Flag this post
Enterprise Design Patterns: The Repository Pattern (Catalog of Patterns of EAA) — A Practical Guide with Python
💾Minimal Databases
Flag this post
[Tool] RE-Architect: Automated binary analysis with multiple decompilers + AI explanations
🔓Decompilers
Flag this post
Security Audit of intel ICE Driver for e810 Network Interface Card
arxiv.org·2d
🛡️Taint Analysis
Flag this post
My query languages library pivot
📇Symbol Tables
Flag this post
List Decoding and New Bicycle Code Constructions for Quantum LDPC Codes
arxiv.org·1d
📡Binary Protocols
Flag this post
Cancer; A Crime Story (and other tales of optimization gone wrong)
lesswrong.com·9h
✅Type Checking
Flag this post
You'll never guess what the most common passwords are. Oh, wait, yes you will
🛡️Parser Security
Flag this post
A Security Model for Systemd
🛡️Security Type Systems
Flag this post
[TUI] Ricing the original Rogue
🏷️Symbol Mangling
Flag this post
Beyond Correctness: Evaluating Subjective Writing Preferences Across Cultures
⚖️Weighted Automata
Flag this post
LDBT instead of DBTL: combining machine learning and rapid cell-free testing
nature.com·2d
✨Effect Inference
Flag this post
Loading...Loading more...