Learning a Bit of VGA
usebox.net·1d·
Discuss: Hacker News
SIMD Optimization
Flag this post
How We Found 7 TiB of Memory Just Sitting Around
render.com·6d·
🧮Memory Models
Flag this post
How AGI became the most consequential conspiracy theory of our time
technologyreview.com·6d·
🤖Transformers
Flag this post
Ask HN: Do you have an aversion to recent TLDs?
news.ycombinator.com·4d·
Discuss: Hacker News
🌐WebAssembly
Flag this post
Writing an Asciidoc Parser in Rust: Asciidocr
bikesbooksandbullshit.com·3d·
🦀Rust Compilers
Flag this post
Pangolin (YC S25) Is Hiring a Full Stack Software Engineer (Open-Source)
docs.pangolin.net·4d·
Discuss: Hacker News
🌍Distributed Systems
Flag this post
Context engineering
chrisloy.dev·6d·
🤖Transformers
Flag this post
Paris Had a Moving Sidewalk in 1900, and a Thomas Edison Film Captured It
openculture.com·2d·
Discuss: Hacker News
🎯Reinforcement Learning
Flag this post
Writing FreeDOS Programs in C
freedos.org·3d·
Discuss: Hacker News
🦀Rust Compilers
Flag this post
Border Patrol agent testifies sandwich thrown at him "exploded all over,"
cbsnews.com·15h·
Discuss: Hacker News
🔓binary exploitation
Flag this post
S.a.r.c.a.s.m: Slightly Annoying Rubik's Cube Automatic Solving Machine
github.com·4d·
Discuss: Hacker News
SIMD Optimization
Flag this post
Intervaltree with Rust Back End
github.com·3d·
Discuss: Hacker News
🦀Rust Compilers
Flag this post
Linux/WASM
joelseverin.github.io·3d·
🌐WebAssembly
Flag this post
Immutable releases are now generally available on GitHub
github.blog·5d·
Discuss: Hacker News
🌐WebAssembly
Flag this post
Wikipedia row erupts as Jimmy Wales intervenes on 'Gaza genocide' page
thenational.scot·1d·
Discuss: Hacker News
🔓binary exploitation
Flag this post
A URL to respond with when your boss says "But ChatGPT Said "
stopcitingai.com·6d·
🤖Transformers
Flag this post
Uv Crash Course
lernerpython.com·2d·
Discuss: Hacker News
🌐WebAssembly
Flag this post
CLI to manage your SQL database schemas and migrations
github.com·3d·
Discuss: Hacker News
🦀Rust Compilers
Flag this post
At the end you use Git bisect
kevin3010.github.io·2d·
Discuss: Hacker News
🔍Symbolic Execution
Flag this post
Leaker reveals which Pixels are vulnerable to Cellebrite phone hacking
arstechnica.com·5d·
🔒Hardware Security
Flag this post