Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·1d
📚Stack Allocation
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·9h
🛡️Security Type Systems
Flag this post
Rust 1.91 adds Tier 1 support for ARM64 Windows platform, raw pointer warnings, and more
alternativeto.net·17h
⚙️TOML Parsers
Flag this post
In-DRAM TRNG Using Simultaneous Multiple-Row Activation (ETH Zurich, CISPA)
semiengineering.com·8h
🏰Capability Machines
Flag this post
RISC-V Summit spurs new round of automotive support
edn.com·1d
🔧RISC-V
Flag this post
CTD during main menu, error says it's Compass Navigation Overhaul. Can you guys help me decode the crash log?
💬Error Messages
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.club·7h
📦Allocation Elision
Flag this post
On Epistemic Uncertainty of Visual Tokens for Object Hallucinations in LargeVision-Language Models
✨Effect Inference
Flag this post
TinyML is the most impressive piece of software you can run on any ESP32
xda-developers.com·14h
💬Smalltalk VMs
Flag this post
Modern EDR Countermeasures: Fundamentals and Practical Guide to User-Mode Function Hooking
🪤Trap Handlers
Flag this post
How Android provides the most effective protection to keep you safe from mobile scams
🔗Hash Functions
Flag this post
Interfacing assembly with BASIC via DEFUSR, part 7
subethasoftware.com·1d
⚙️Assembly
Flag this post
Show HN: Fast-posit, sw implementation of posit arithmetic in Rust
🔗Borrowing Extensions
Flag this post
Support the call for Memory Safety incentives in EU cybersecurity policies
trifectatech.org·1d
🗺️Region Types
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·17h
🔗Hash Functions
Flag this post
Loading...Loading more...