Prog8
github.com·2d·
Discuss: Hacker News
Formal Methods
Flag this post
Readable Code Is Unreadable
blog.wilsonb.com·2d·
Discuss: Hacker News
🦀Rust
Flag this post
Changing the AI narrative from liberation to acceleration
idratherbewriting.com·1d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
The Evolution of GPUs: How Floating-Point Changed Computing
dell.com·4d·
Discuss: Hacker News
CUDA
Flag this post
original ↗
wilsoniumite.com·2d·
🦀Rust
Flag this post
Marden's Theorem
en.wikipedia.org·17h·
Discuss: Hacker News
🔐Zero-Knowledge Proofs
Flag this post
The Same Feature That Makes a Component Powerful Can Also Make It Dangerous
blog.zast.ai·2d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
How a Nix flake made our polyglot stack (and new dev onboarding) fast and sane
fiveonefour.com·1d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
Show HN: I got Stability AI's small audio model into a consumer iOS app
news.ycombinator.com·10h·
Discuss: Hacker News
🦀Rust
Flag this post
OIDC workload identity on AWS
latacora.com·2d·
Discuss: Hacker News
🔒Cryptography
Flag this post
How LLMs Cheat: Modifying Tests and Overloading Operators
enbao.me·3d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
Inline vs. Pipeline Ray Tracing
evolvebenchmark.com·2d·
Discuss: Hacker News
🎨Rendering
Flag this post
Embedding TypeScript
andrews.substack.com·20h·
Formal Methods
Flag this post
What does OSWorld tell us about AI's ability to use computers?
epoch.ai·2d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
AI's capabilities may be exaggerated by flawed tests, according to new study
nbcnews.com·15h·
Discuss: Hacker News
Formal Methods
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
simonwillison.net·4d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
The future of LLMs: cognitive core and cartridges?
killerstorm.github.io·1d·
Discuss: Hacker News
🔐Zero-Knowledge Proofs
Flag this post
Switching from GPG to Age
luke.hsiao.dev·1d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
Developing desktop apps from scratch: A feature checklist
alek-tron.com·1d·
Discuss: Hacker News
Formal Methods
Flag this post
Russian spies pack custom malware into hidden VMs on Windows machines
theregister.com·2d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post