Procedural Macros, Code Generation, Derive Traits, Metaprogramming

Colleges are insanely inefficient at teaching.
reddit.com·17h·
🐻Brown University
Guacamole: The Great Divider 🥑
gooses-muses.bearblog.dev·15h
🍳Cooking
Frying Eggs and Air Quality Tests
chillphysicsenjoyer.substack.com·20h·
Discuss: Substack
🤖Home Assistant
M&Ms Colour Distribution
andrei.xyz·9h
📱New tech trends
Distressed Trader’s Soy Can Feed Pigs in Argentina, Suitor Says
bloomberg.com·22h
🥩Alternative Proteins
Not for money
independent.bearblog.dev·12h
🚀Startups
In defence of Reckless love. A case study.
dandelion-utilitarian.com·21h
🧩Types
i want to know *you*
sulimans.space·8h
📰RSS Reading Practices
New Phoenix attack bypasses Rowhammer defenses in DDR5 memory
bleepingcomputer.com·17h·
Discuss: Hacker News
🔐Hardware Security
Edit PDFs on your Mac for life with this Adobe dupe — 30% Off
nordot.app·9h
📱New tech trends
The IOHub. An Emerging Pattern for System Connectivity in Chiplet-Based Designs
semiwiki.com·4h
🖥GPUs
Lymph node study reveals how aggressive breast cancer evades immune detection
medicalxpress.com·23h
🥬Kimchi
B-TGAT: A Bi-directional Temporal Graph Attention Transformer for Clustering Multivariate Spatiotemporal Data
arxiv.org·13h
📊Embeddings
Easier Postgres fine-tuning with online_advisor
neon.com·23h·
Discuss: Hacker News
📊Database Profiling
Doomprompting: Endless tinkering with AI outputs can cripple IT results
nordot.app·7h
🛡️AI Security
Introducing the A2AJ's Canadian Legal Data: An open-source alternative to CanLII for the era of computational law
arxiv.org·13h
🤖AI
Repeated head trauma causes neuron loss and inflammation in young athletes
nature.com·1h
💾Persistence Strategies
JANUS: A Dual-Constraint Generative Framework for Stealthy Node Injection Attacks
arxiv.org·13h
🛡️AI Security
Stratified wind from a super-Eddington X-ray binary is slower than expected
nature.com·1h
⚛️Physics
Magnetic microscopy for operando imaging of battery dynamics
nature.com·7h
📦In-process Databases