How an Attacker Drained $128M from Balancer Through Rounding Error Exploitation
research.checkpoint.com·4h
💣Binary Exploitation
Flag this post
Inside Pinecone: Slab Architecture
🌳Red-Black Trees
Flag this post
The Noise and the Signal
λFunctional Programming
Flag this post
Functional programming, demystified: What we learned at Nu Engineering Meetup
building.nubank.com·2d
λFunctional Programming
Flag this post
Solving the AI Black Box Problem with Prisma AIRS 2.0
paloaltonetworks.com·2h
📈Optimization
Flag this post
Testing Cursor's New Model: Composer
shuttle.dev·16h
🔬Static Analysis
Flag this post
Dive into Systems
🔄Dynamic Programming
Flag this post
A Project Is Not a Bundle of Tasks
🎯A* Search
Flag this post
Transformer-Based Decoding in Concatenated Coding Schemes Under Synchronization Errors
arxiv.org·1d
λFunctional Programming
Flag this post
Tackling the Kidnapped Robot Problem via Sparse Feasible Hypothesis Sampling and Reliable Batched Multi-Stage Inference
arxiv.org·1d
🔄Dynamic Programming
Flag this post
Beyond Standard LLMs
🔄Dynamic Programming
Flag this post
Going From Reactive to Predictive Incident Response with AIOps
hackernoon.com·19h
🏗️Design Patterns
Flag this post
AI Safety at the Frontier: Paper Highlights of October 2025
lesswrong.com·3h
λFunctional Programming
Flag this post
Designing Data-Intensive Applications [Book Review]-The Big Ideas Behind Reliable, Scalable and Maintainable Systems
🏗️Design Patterns
Flag this post
Agentic World Modeling for 6G: Near-Real-Time Generative State-Space Reasoning
arxiv.org·11h
🏗️Design Patterns
Flag this post
Loading...Loading more...