Automated Verification of Code Logic & Security Vulnerabilities via Hyperdimensional Semantic Analysis
dev.toยท6hยท
Discuss: DEV
๐ŸŒณPattern Match Compilation
CPU Cache-Friendly Data Structures in Go: 10x Speed with Same Algorithm
skoredin.proยท4hยท
Discuss: Hacker News
โšกCache Optimization
smartgo: I wish for a Go-like language with Rust-like pointers
iio.ieยท7h
๐Ÿ”’Rust Borrowing
Souvenir
deprogrammaticaipsum.comยท7h
๐Ÿ”—Weak References
Rigorous Evaluation of Microarchitectural Side-Channels with Statistical Model Checking
arxiv.orgยท6h
๐Ÿ“ฑBytecode Design
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.comยท15hยท
Discuss: Hacker News
๐Ÿ›ก๏ธStack Safety
Four years, Five failures, One compiler
daymare.netยท1dยท
๐ŸŒฑMinimal Languages
Focus more time toward C or C++ development as decent C++ programmer
reddit.comยท8hยท
Discuss: r/embedded
๐Ÿ“–Literate Programming
Property-based testing of batch-invariant operations
mmaaz.caยท11hยท
Discuss: Hacker News
๐ŸŽฒProperty Testing
A Primer on Memory Consistency and Cache Coherence, Second Edition
link.springer.comยท17hยท
Discuss: r/programming
๐Ÿง Memory Models
New comment by debugnik in "A comparison of Ada and Rust, using solutions to the Advent of Code"
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿ”’Rust Borrowing
Delimited Continuations in Lone Lisp
matheusmoreira.comยท3dยท
๐Ÿ”ฎLisp Interpreters
Fun with HyperLogLog and SIMD
vaktibabat.github.ioยท2dยท
๐Ÿ”ขBit Manipulation
GSoC 2025 - Support simple C++20 modules use from the Clang driver without a build system
blog.llvm.orgยท10hยท
Discuss: r/cpp
๐Ÿช†Embedded DSLs
Understanding the KV Cache (feat. Self-Attention)
dev.toยท3hยท
Discuss: DEV
๐Ÿ”„Subinterpreters
std::ranges may not deliver the performance that you expect
lemire.meยท13hยท
Discuss: Hacker News
๐ŸƒEscape Analysis
What Happens Behind the Scenes When You Run Python Code
fusion-institute.comยท1hยท
Discuss: DEV
๐Ÿ”งError Recovery
My custom two realtime concurrency primitives
blog.inkreas.ingยท1dยท
Discuss: r/rust
๐Ÿ”—Concurrency Primitives
How we trained an ML model to detect DLL hijacking
securelist.comยท2h
๐Ÿท๏ธMemory Tagging
C? Rewrite it in Brainfuck
iacgm.pages.devยท2dยท
๐Ÿช„C Metaprogramming