Cactus Language • Semantics 1
inquiryintoinquiry.com·2h
📋Backus-Naur Form
Introducing CodeMender: an AI agent for code security
deepmind.google·5h·
Discuss: Hacker News
🛡️Parser Security
Event Handling: Automatic Event Bootstrapping
gitlab.com·4h·
Discuss: DEV
📡Protocol Buffers
Gabriele Bartolini: CNPG Recipe 22 - Leveraging the New Supply Chain and Image Catalogs
gabrielebartolini.it·8h
🗑️Stack Scanning GC
A grand week
blog.mitrichev.ch·1d·
🧩Constraint Solvers
How To Build Effective Technical Guardrails for AI Applications
towardsdatascience.com·1h
🛡️Security Type Systems
ReSharper and Rider 2025.2.3: The Third Set of Updates Released
blog.jetbrains.com·9h
🐛Interactive Debuggers
Four years, Five failures, One compiler
daymare.net·1d·
🌱Minimal Languages
The Inverse Matrix problem
talesfrom.dev·18h
🚂Error Propagation
New comment by debugnik in "A comparison of Ada and Rust, using solutions to the Advent of Code"
news.ycombinator.com·1d·
Discuss: Hacker News
🔒Rust Borrowing
Simple hash map in C, for learning purpose
reddit.com·7h·
🏷️Symbol Interning
Progressive Bound Strengthening via Doubly Nonnegative Cutting Planes for Nonconvex Quadratic Programs
arxiv.org·14h
🧩Constraint Solvers
From Zero to Production: Creating ReceiptFlow Pro in 10 Hours Using AI-Powered Development
dev.to·7h·
Discuss: DEV
🎭Program Synthesis
Embracing the parallel coding agent lifestyle
simonw.substack.com·18h·
Discuss: Substack
Live Coding
LLM Optimization Notes: Memory, Compute and Inference Techniques
gaurigupta19.github.io·3h·
Discuss: Hacker News
🗺️Region Inference
How Much Should You Tell Your AI Agent?
raymondyxu.com·1d·
Discuss: Hacker News
💬Interactive REPLs
How to Prevent NPM Supply Chain Attacks in CI/CD Pipelines with Container Security
blog.qualys.com·5h
📦Dependency Analysis
Claude Code sucks but is still useful: experiences maintaining Julia’s SciML scientific computing infrastructure
stochasticlifestyle.com·12h
🌳Tree Shaking
Best MariaDB Clients in 2025
dbvis.com·11h·
Discuss: DEV
📈Query Optimization
Automatic Building Code Review: A Case Study
arxiv.org·14h
📦Dependency Analysis