Codie's Cognitive Chronicals
dev.to·16h·
Discuss: DEV
🏺Code Archeology
WASM in the Kernel: Tales of Triumph and Trouble
riptides.io·5h·
Discuss: Hacker News
🌐WASM Runtimes
Beating the L1 cache with value speculation (2021)
mazzo.li·3h·
Discuss: Lobsters
🔮Branch Predictors
What Happens Behind the Scenes When You Run Python Code
fusion-institute.com·9h·
Discuss: DEV
🔧Error Recovery
logbloglogbloglogblog
dev.to·1h·
Discuss: DEV
📊Log Parsers
Beyond the Final Answer: Evaluating the Reasoning Trajectories of Tool-Augmented Agents
arxiv.org·15h
📋Souffle Datalog
Embracing the parallel coding agent lifestyle
simonw.substack.com·18h·
Discuss: Substack
Live Coding
Detecting DLL hijacking with machine learning: real-world cases
securelist.com·11h
🛡️Taint Analysis
Highly concurrent in-memory counter in GoLang
engineering.grab.com·19h
🧠Memory Models
Optimizing queries by using observability
infoworld.com·7h
📈Query Optimization
Obelisk 0.25.4 and handling of WASM traps
obeli.sk·5h·
🛡️Error Handling
Design Principle: Composable Services
sleepingpotato.com·5h·
Discuss: Hacker News
🔀Control Structures
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·6h
🏷️Memory Tagging
Understanding Linux Namespaces: A Guide to Process Isolation
dev.to·2h·
Discuss: DEV
🛡️Capability VMs
Event Handling: Automatic Event Bootstrapping
gitlab.com·4h·
Discuss: DEV
📡Protocol Buffers
A case for learning GPU programming with a compute-first mindset – Maister's Gr
themaister.net·7h·
🔗Language Toolchains
Why Small Coding Habits Matter for Developers
blog.shubhra.dev·12h·
Discuss: DEV
📚Self-Documenting Code
When to Use Zod, TypeScript, or Both: A Developer’s Guide
blog.logrocket.com·5h
🛡️Error Ergonomics
The Compiler's Secret: How Coroutines Actually Work
dev.to·3h·
Discuss: DEV
🔄Coroutines
How To Build Effective Technical Guardrails for AI Applications
towardsdatascience.com·1h
🛡️Security Type Systems