The 80/20 Rule Doesnโ€™t Apply to Security: How Cisco SASE Bridges the Gap
blogs.cisco.comยท20h
๐Ÿ”Capability Protocols
Porting a library to a different language with a sentence
randomlabs.aiยท11hยท
Discuss: Hacker News
๐ŸŽฎLanguage Ergonomics
Can coding agents build complex systems?
technicaldeft.comยท2hยท
Discuss: Hacker News
๐ŸŽญProgram Synthesis
Building a Debugger โ€ข Sy Brand & Tim Misiak
buzzsprout.comยท1dยท
Discuss: r/programming
๐Ÿ”Debugging Compilers
Object Orientation [2013 !]
jackrusher.comยท2dยท
Discuss: Hacker News
๐Ÿ’ฌSmalltalk VMs
ECCFROG522PP: An Enhanced 522-bit Weierstrass Elliptic Curve
eprint.iacr.orgยท11h
๐Ÿ”—Hash Functions
Quantum Simulation Programming via Typing
arxiv.orgยท4h
๐Ÿ—๏ธMinimal Compilers
A Lightweight Authentication and Key Agreement Protocol Design for FANET
arxiv.orgยท4h
๐Ÿ›ก๏ธSecurity Type Systems
My Google Summer of Code Journey: Part 3
dev.toยท2dยท
Discuss: DEV
๐Ÿท๏ธMemory Tagging
Proof Rules for MetaSMT
philipzucker.comยท1d
๐ŸงฎTheorem Provers
Emotions are Recognized Patterns of Cognitive Activities
arxiv.orgยท4h
๐ŸŽฏFinite Automata
Prompt-with-Me: in-IDE Structured Prompt Management for LLM-Driven Software Engineering
arxiv.orgยท4h
๐Ÿ“šSelf-Documenting Code
Psychometric Personality Shaping Modulates Capabilities and Safety in Language Models
arxiv.orgยท4h
โšกAlgebraic Effects
MERN Stack Alternatives in Golang
dev.toยท6hยท
Discuss: DEV
๐ŸนGo Runtime
Taming Stateful at the Edge: A Real-Time API with Cloudflare Durable Objects
dev.toยท49mยท
Discuss: DEV
๐Ÿ“ฎPersistent Queues
pBeeGees: A Prudent Approach to Certificate-Decoupled BFT Consensus
arxiv.orgยท4h
๐Ÿ“กBinary Protocols
Trainee Action Recognition through Interaction Analysis in CCATT Mixed-Reality Training
arxiv.orgยท4h
๐Ÿ—๏ธMLIR
Auditability and the Landscape of Distance to Multicalibration
arxiv.orgยท4h
๐Ÿ—บ๏ธRegion Inference
Variation in Verification: Understanding Verification Dynamics in Large Language Models
arxiv.orgยท4h
๐ŸŽฒParser Fuzzing