These 3 lesser-known free Android apps make my life easier
makeuseof.com·8h
💬Smalltalk VMs
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·1d
🛡️Security Type Systems
Flag this post
(PR) SK hynix Showcases Full-Stack AI Memory Portfolio at 2025 OCP Global Summit
techpowerup.com·1d
Performance
Flag this post
Strix Halo's Memory Subsystem: Tackling iGPU Challenges
old.chipsandcheese.com·23h·
Discuss: Hacker News
Cache Optimization
Flag this post
Java 25: Top 3 Features That Redefine Performance, Startup, and Efficiency
dev.to·1d·
Discuss: DEV
📏Linear Types
Flag this post
Some Fun Videos on Optimizing NES Code
bumbershootsoft.wordpress.com·2h
🌊Loop Invariant Motion
Flag this post
Using the expand and contract pattern for schema changes
prisma.io·1d·
Discuss: Hacker News
🔄Copy Propagation
Flag this post
System Design Explained Like a Human — 25 Core Concepts with Real Examples and Tools Part -1
dev.to·14h·
Discuss: DEV
📮Persistent Queues
Flag this post
Best Open Source Observability Solutions
clickhouse.com·1d·
Discuss: Hacker News
↔️Bidirectional Sync
Flag this post
Bayesian continual learning and forgetting in neural networks
nature.com·2d
🗺️Region Inference
Flag this post
Beyond Brute Force: 4 Secrets to Smaller, Smarter, and Dramatically Cheaper AI
hackernoon.com·7h
📏Linear Memory
Flag this post
A hitchhiker's guide to CUDA programming
seanzhang.me·2d·
Discuss: Hacker News
🔀SIMD Programming
Flag this post
Introducing Project Telos: Modeling, Measuring, and Intervening on Goal-directed Behavior in AI Systems
lesswrong.com·1d
🎭Erlang OTP
Flag this post
How We Saved 70% of CPU and 60% of Memory in Refinery’s Go Code, No Rust Required.
honeycomb.io·1d·
📚Stack Data Structures
Flag this post
Why AI companions exploit the same psychology as teddy bears
lightcapai.medium.com·3h·
Discuss: Hacker News
🏷️Attribute Grammars
Flag this post
A portable picokernel for async I/O
ryansepassi.com·18h·
Discuss: Hacker News
🤖Embedded Go
Flag this post
Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Post-Quantum Cryptography Threats
dev.to·12h·
Discuss: DEV
🔗Hash Functions
Flag this post
Minimal Sufficiency: A Principle ‘Similar’ to End-to-End
cacm.acm.org·1d·
Discuss: Hacker News
📡Protocol Stacks
Flag this post
Accelerating AI inferencing with external KV Cache on Managed Lustre
cloud.google.com·1d
Cache-Aware Algorithms
Flag this post
Diving into FoundationDB's Simulation Framework
pierrezemb.fr·2d
📡Erlang
Flag this post