Password Security Part 2: The Human Factor – Password Patterns and Weaknesses
guidepointsecurity.com·1d
🔗Hash Functions
Model Kombat by HackerRank
producthunt.com·20h
🏁Language Benchmarks
Status Week 37
blogs.gnome.org·1d
⚙️TOML Parsers
Optimizing the Ever-Growing Balance in the War Robots Project
dev.to·14h·
Discuss: DEV
⏱️Real-Time GC
What will AI look like by 2030 if current trends hold?
threadreaderapp.com·7h
🗺️Region Inference
Down and out with Cerebras Code
infoworld.com·1d
Tokenizer Optimization
Embedded projects for someone looking to break into the field?
github.com·5h·
Discuss: r/embedded
📚Self-Documenting Code
Ian Bos
hackaday.com·1d
🐹Minimal Go
Gambit: An efficient implementation of the Scheme programming language
github.com·2d·
Discuss: Hacker News
🔧Scheme Macros
Zettelkasten for Programmers: Processing Swift Actor Usage Advice in Depth
christiantietze.de·18h
Gleam
NestJS Authentication with Stytch: Complete Starter Guide
dev.to·2h·
Discuss: DEV
🌐Browser REPLs
Building a Legal Document Intelligence Platform with BigQuery AI: 99% Efficiency Implementation Guide
github.com·15h·
Discuss: DEV
Incremental Parsing
FOREX: $161.47 to one US dollar - Jamaica Observer
jamaicaobserver.com·1d
🐍lisp
Building a Simple Stack-Based Virtual Machine in Go
blog.phakorn.com·1d·
📚Stack Data Structures
I made a Chrome extension that forces you to learn React :D
reddit.com·23h·
Discuss: r/reactjs
🏠indieweb
Why You Need to Know How a Database Works Internally?
dev.to·2d·
Discuss: DEV
🗄️Database Engines
The pirate-based logic of Rust shared references
ais523.me.uk·2d·
🔒Rust Borrowing
The Risks of Code Assistant LLMs: Harmful Content, Misuse and Deception
unit42.paloaltonetworks.com·1d
🎮Language Ergonomics
I tested AI tools on data analysis — here’s how they did (and what to look out for)
onlinejournalismblog.com·11h
🌱Minimal ML
Caffeinated Commits- Day 1 & 2
dev.to·2d·
Discuss: DEV
📋Souffle Datalog