Security Toolkit, a comprehensive collection of security tools and resources
securitytoolkits.com·13h·
Discuss: Hacker News
Flag this post
New Attacks Against Secure Enclaves
schneier.com·3d·
Discuss: Hacker News
Flag this post
Comparing Integers and Doubles
databasearchitects.blogspot.com·19h·
Discuss: Hacker News
Flag this post
CACM Practice Welcomes Submissions
dl.acm.org·1d·
Discuss: Hacker News
Flag this post
Easel's State-of-the-Art Rollback Netcode Implementation
easel.games·2d·
Flag this post
Refreshing Apache XML Infrastructure
blog.adamretter.org.uk·2d·
Flag this post
TimeClout: A New, Open-Source Tool to End Shift Scheduling Headaches
metaduck.com·1d·
Discuss: Hacker News
Flag this post
Exceptions in Cranelift and Wasmtime
cfallin.org·6d·
Flag this post
Show HN: Reversing a Cinema Camera's Peripherals Port
3nt3.de·1d·
Flag this post
An interview with William Kahan, the old man of floating-point. (1998)
people.eecs.berkeley.edu·2d·
Discuss: Hacker News
Flag this post
Inferno: Single player remaster of the 1995 classic Descent 1
github.com·1d·
Discuss: Hacker News
Flag this post
sudo-rs Affected By Multiple Security Vulnerabilities - Impacting Ubuntu 25.10
phoronix.com·1d·
Flag this post
Surviving the great commoditizer: Stop getting «good» at LLMS
hitsubscribe.com·2d·
Discuss: Hacker News
Flag this post
Git Quick – fast Git workflows with AI-powered commit messages
medium.com·1d·
Discuss: Hacker News
Flag this post
The Transformer and the Hash: building blocks of 21st century political science
nothinghuman.substack.com·9h·
Discuss: Substack
Flag this post
MCP was the wrong abstraction for AI agents
getateam.org·3d·
Discuss: Hacker News
Flag this post
FEX-emu – run x86 applications on ARM64 Linux devices
fex-emu.com·18h·
Discuss: Hacker News
Flag this post
Learning Biology as a Software Developer
pablofarias.com·2d·
Discuss: Hacker News
Flag this post
Abusing the Harvard Architecture in Nand2Tetris Assembly
ashdnazg.github.io·4d·
Discuss: Hacker News
Flag this post
Introduction: Truthmaker Semantics: What, What For, and How?
link.springer.com·1d·
Discuss: Hacker News
Flag this post