Context Pruning in Conversational Agent
poonai.xyz·1d·
Discuss: Hacker News
💻Programming languages
An Inline Cache Isn't Just a Cache
mgaudet.ca·20h·
Discuss: Hacker News
🧠Memory Management
Object Reorientation: Generic Functions
gigamonkeys.com·17h·
Discuss: Hacker News
💻Programming languages
SlateDB: An embedded database built on object storage
slatedb.io·7h·
📦Data Serialization
What's new in Kotlin 2.2.20
kotlinlang.org·1d·
💻Programming languages
Show HN: Llmswap – Universal AI SDK and Code Generation CLI
sreenathmenon.com·23h·
Discuss: Hacker News
💻Programming languages
Performance Improvements in .NET 10
devblogs.microsoft.com·1d·
💻Programming languages
Architecting Precision: Breakthrough Frameworks Redefine Systems and Data Integration
hackernoon.com·14h
💻Programming languages
Bypassing WAFs for Fun and JavaScript Injection with Parameter Pollution
blog.ethiack.com·5h·
Discuss: Hacker News
💻Programming languages
Introduction to Linear Types
austral-lang.org·4d·
Discuss: Hacker News
🧠Memory Management
Rust's Enterprise Breakthrough Year
rust-trends.com·2d·
Discuss: Hacker News
🦀Rust
Prototype Pollution in Python (2023)
blog.abdulrah33m.com·3h·
Discuss: Hacker News
💻Programming languages
Using Linters to Direct Agents
factory.ai·2d·
Discuss: Hacker News
💻Programming languages
Structs and Embedded Schemas in Elixir: Beyond Maps
blog.appsignal.com·2d·
Discuss: Hacker News
🗃️Database Internals
Memory Integrity Enforcement: A complete vision for memory safety in Apple devices
security.apple.com·2d·
🧠Memory Management
All You Need Is MCP – LLMs Solving a DEF Con CTF Finals Challenge
wilgibbs.com·8h·
Discuss: Hacker News
💻Programming languages
Many Hard Leetcode Problems are Easy Constraint Problems
buttondown.com·1d·
🗃️Database Internals
Nanonext: breaking down language barriers in data science
tidyverse.org·3h·
💻Programming languages
Building a shared world with systems we don't understand–what could go wrong?
syntheticauth.ai·5h·
Discuss: Hacker News
🌐Distributed systems
How to Prove False Statements: Practical Attacks on Fiat-Shamir
eprint.iacr.org·1d·
🔐Security Patterns