original โ†—
toast.alยท1d
๐Ÿ”„Bootstrapping
Flag this post
NEWS ROUNDUP โ€“ 21st November 2025
digitalforensicsmagazine.comยท1d
๐Ÿ”Security Types
Flag this post
Making SLH-DSA 10x-100x Faster
conduition.ioยท10h
๐Ÿ”—Hash Algorithms
Flag this post
Automating Documentation Maintenance with Prodigy: A Real-World Case Study
entropicdrift.comยท1dยท
Discuss: r/programming
๐Ÿ“šSelf-Documenting Code
Flag this post
Management Pseudo-Science
laser-coder.netยท18hยท
Discuss: Hacker News
๐Ÿ“ŠCode Metrics
Flag this post
Codeminer42 Dev Weekly #88
blog.codeminer42.comยท1d
๐ŸบCode Archeology
Flag this post
Cross-referencing code and specs for maintainability (2024-03-21)
ueber.netยท1dยท
Discuss: Hacker News
๐Ÿ“กNetwork Serialization
Flag this post
Taming the Data Beast: Build Pipelines That Bend, Not Break by Arvind Sundararajan
dev.toยท1dยท
Discuss: DEV
๐Ÿ“‹JSON Parsing
Flag this post
Building an impossible Tic-Tac-Toe with Minimax and LemonadeJS
dev.toยท15hยท
Discuss: DEV
๐ŸŽชPlayground Compilation
Flag this post
Learning Xahau: Automating Reward Claims with Hooks and CronSet
dev.toยท21hยท
Discuss: DEV
๐Ÿ”„Copy Propagation
Flag this post
YASA (Yet Another Static Analyzer)
github.comยท2dยท
Discuss: Hacker News
๐Ÿ”Static Analysis
Flag this post
Hack a Windows System Using PowerShell
dev.toยท1dยท
Discuss: DEV
๐Ÿ’ปTerminal Control
Flag this post
Series Week 9/52 โ€” Oracle Compliance for CTOs: RBI & IRDAI Expectations
dev.toยท19hยท
Discuss: DEV
๐Ÿ›ก๏ธError Boundaries
Flag this post
A Beginnerโ€™s Guide to the CVE Database
blog.sucuri.netยท3d
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post
I use AI to synthesize all my datasets now
thefulldatastack.substack.comยท15hยท
Discuss: Substack
๐Ÿท๏ธAttribute Grammars
Flag this post
Common Coding Mistakes at Every Level (And How to Fix Them)
github.comยท1dยท
Discuss: DEV
๐Ÿ”งError Recovery
Flag this post
The Sacrilegious Coder
medium.comยท11hยท
Discuss: DEV
๐Ÿ“šSelf-Documenting Code
Flag this post
Beyond the Watering Hole: APT24's Pivot to Multi-Vector Attacks
cloud.google.comยท2d
๐Ÿ›ก๏ธParser Security
Flag this post
From Raw to Refined: Data Pipeline Architecture at Scale
dev.toยท13hยท
Discuss: DEV
๐Ÿ”„Copy Propagation
Flag this post
Understanding LLMs as Pattern Machines, Not Thinking Partners
practicalsecurity.substack.comยท1dยท
Discuss: Substack
๐ŸŽญProgram Synthesis
Flag this post