gf256's Top FindsLoading...
The Same Feature That Makes a Component Powerful Can Also Make It Dangerous
blog.zast.ai·1d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
Using Coding Agents to Decompile Nintendo 64 Games
blog.chrislewis.au·23h·
Discuss: Hacker News
Formal Methods
Flag this post
Prentice Hall Interview with Rich Stevens, Author of Unix Programming (1997)
kohala.com·1h·
Discuss: Hacker News
Flag this post
A Noob's Guide to Kubernetes Monitoring: SigNoz vs. Datadog vs. Grafana
simpletechguides.com·3h·
Discuss: Hacker News
🔒Cryptography
Flag this post
Pain Points of OCaml
quamserena.com·2d·
🦀Rust
Flag this post
Inline vs. Pipeline Ray Tracing
evolvebenchmark.com·1d·
Discuss: Hacker News
🎨Rendering
Flag this post
Ask HN: Ayar Labs, how big a deal are optical chiplets?
news.ycombinator.com·2h·
Discuss: Hacker News
CUDA
Flag this post
ZkML Breakthrough: 13B Models Verified in 15 Minutes
lightcapai.medium.com·3d·
Discuss: Hacker News
🔐Zero-Knowledge Proofs
Flag this post
On Reed–Solomon Proximity Gaps Conjectures
eprint.iacr.org·15h
🔐Zero-Knowledge Proofs
Flag this post
Enabling Trillion-Parameter Models on AWS EFA
research.perplexity.ai·1d·
Discuss: Hacker News
CUDA
Flag this post
Physics-driven self-supervised learning for 3D light-field microscopy
nature.com·9h·
Discuss: Hacker News
🎨Rendering
Flag this post
Handling Noisy Plaintext Checking Oracles with SPiRiT
eprint.iacr.org·19h
📡Side-Channel Attacks
Flag this post
A Short Survey of Compiler Backends
abhinavsarkar.net·23h·
Formal Methods
Flag this post
Recursive macros in C, demystified (once the ugly crying stops)
h4x0r.org·20h·
🦀Rust
Flag this post
Why Bcrypt Can Be Unsafe for Password Hashing?
blog.enamya.me·13h·
Discuss: Hacker News
Flag this post
Voxel Grid Visibility
cod.ifies.com·1d·
CUDA
Flag this post
Protecting Against Open-Source Malicious Packages: What Doesn't Work
xygeni.io·1h·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
Sign up or login to customize your feed and get personalized topic recommendations
Building Real-Time ML Feature Pipelines with Streaming SQL
timeplus.com·18h·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
Myers Diff for Tab Management: Part 2
deontevanterpool.com·11h·
Discuss: Hacker News
Flag this post
Strong Authentication in a Post-Quantum World
kuppingercole.com·1d·
Discuss: Hacker News
🔒Cryptography
Flag this post