The 80/20 Rule Doesn’t Apply to Security: How Cisco SASE Bridges the Gap
blogs.cisco.com·3h
🔐Capability Protocols
We, Programmers A Chronicle of Coders from Ada to AI
gwolf.org·19h
🏺Code Archeology
My corner of the TTRPG universe
blog.balthazar-rouberol.com·17h
🔄Bootstrapping
Bezier Curve as Easing Function in C++
asawicki.info·2d·
Discuss: Hacker News
🔮Type Inference Visualization
Plan 9: The Infinity Notebook
lifeofpenguin.blogspot.com·1d·
Discuss: Hacker News
🎯99-Line Tools
Secure Software Supply Chains, Urges Former Go Lead Russ Cox
developers.slashdot.org·1d
🔗Language Toolchains
Incommensurability
lesswrong.com·13h
🪞Homoiconicity
NPM attacks and the security of software supply chains
infoworld.com·6h
🥾Bootstrapping Strategies
Getting counter-intuitive results with local KV Cache Quantization Benchmark - am I doing something wrong?
reddit.com·19h·
Discuss: r/LocalLLaMA
💾Cache Algorithms
DevSecOps FAQs
dev.to·3d·
Discuss: DEV
🛡️Taint Analysis
Big O Notation pt.1: Time Complexity
dev.to·21h·
Discuss: DEV
🪢Rope Data Structures
Security Amplification of Threshold Signatures in the Standard Model
eprint.iacr.org·3d
Gleam
Understanding how Python's list comprehensions work under the hood
dev.to·2d·
Discuss: DEV
💬Interactive REPLs
Vibe Coding: My Ultimate Checklist for Building Software with AI Magic
dev.to·1d·
Discuss: DEV
🎮Language Ergonomics
Tech With Tim: Insane AI Tool Lets Me Code 3x Faster (Wispr Flow Walkthrough)
dev.to·1h·
Discuss: DEV
💬Interactive REPLs
Consensus as Computation | A Developer’s View
dev.to·3h·
Discuss: DEV
🔄Coroutines
Clean Architecture for .NET API + Blazor Server: A Practical, Testable Template
dev.to·3h·
Discuss: DEV
🔧API Design
tauri-helper: A Rust Utility to Auto-Collect Tauri Commands
dev.to·1d·
Discuss: DEV
🦀Rust Macros
Deep Mutational Landscape Mapping for Enhanced Therapeutic Antibody Affinity Maturation
dev.to·2h·
Discuss: DEV
Effect Inference
Building My Own CLI Tool: A Better Way to Share Code with LLMs
dev.to·2d·
Discuss: DEV
🎯99-Line Tools