Why to use vector graphics everywhere?
nilostolte.github.io·18m·
Discuss: Hacker News
🎨Rendering
Flag this post
Material for MkDocs Is No More Long Live Zensical
duerrenberger.dev·1d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
First artificial photosynthesis now produces infinite, clean energy
thetimes.com·1d·
Discuss: Hacker News
🔐Zero-Knowledge Proofs
Flag this post
The Unexpected Effect of AI Coding Tools
dangurney.net·8h·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
IncusOS
discuss.linuxcontainers.org·14h·
📡Side-Channel Attacks
Flag this post
The Hackers Manifesto (The Conscience of a Hacker) (1986)
phrack.org·2d·
Discuss: Hacker News
🔐Zero-Knowledge Proofs
Flag this post
Show HN: Lakekeeper – a fast, lightweight Iceberg REST catalog in Rust
github.com·18h·
Discuss: Hacker News
🦀Rust
Flag this post
What data do coding agents send, and where to?
chasersystems.com·3d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
Why Can't It Be Done Today?
quietmoats.substack.com·9h·
Discuss: Substack
📡Side-Channel Attacks
Flag this post
Toward fast, containerized, user-space filesystems
lwn.net·1d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
Spinning Plates
dylanamartin.com·2h·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
An Engineer's Guide to the Trolley Problem
aliveness.kunnas.com·7h·
Discuss: Hacker News
🔐Zero-Knowledge Proofs
Flag this post
Show HN: Save time and open directly "All Branches"
github.com·1h·
Discuss: Hacker News
Formal Methods
Flag this post
swww renamed to awww, due to the author's guilt from obliviously naming it "final solution"
lgfae.com·13h·
📡Side-Channel Attacks
Flag this post
Ask HN: Ayar Labs, how big a deal are optical chiplets?
news.ycombinator.com·1d·
Discuss: Hacker News
CUDA
Flag this post
GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
cloud.google.com·2d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
Notes on Google's Space Data Centers
angadh.com·2d·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
jstrieb.github.io·2d·
🐛Vulnerability Research
Flag this post
Anukari on the CPU (part 2: CPU optimization)
anukari.com·3h·
Discuss: Hacker News
CUDA
Flag this post
Enabling Trillion-Parameter Models on AWS EFA
research.perplexity.ai·2d·
Discuss: Hacker News
CUDA
Flag this post