Moving V8 to only flat strings
docs.google.comΒ·1dΒ·
Discuss: Hacker News
πŸ“„FlatBuffers
Flag this post
Show HN: FPGA Based IBM-PC-XT
bit-hack.netΒ·2dΒ·
Discuss: Hacker News
πŸ”Hardware Security
Flag this post
Intro to Routing: Mixture-of-Experts and Expert Choice
neelsomaniblog.comΒ·14hΒ·
Discuss: Hacker News
πŸ’¬Prompt Engineering
Flag this post
Securing Runtime of L2 Base Ethereum Nodes
substack.bomfather.devΒ·20hΒ·
Discuss: Hacker News
πŸ”’Tetragon
Flag this post
Flutter vs React Native: Which Is Better for Healthcare & Fitness Apps?
ciphernutz.comΒ·1dΒ·
Discuss: DEV
🌐Web Development
Flag this post
Does Serverless Still Matter?
binaryheap.comΒ·4dΒ·
Discuss: Hacker News
πŸš€Shuttle
Flag this post
Explorations of RDMA in LLM Systems
le.qun.chΒ·4dΒ·
Discuss: Hacker News
⚑RDMA
Flag this post
The Transformer and the Hash: building blocks of 21st century political science
nothinghuman.substack.comΒ·2dΒ·
Discuss: Substack
πŸ”’Digital Privacy
Flag this post
Building "CodeBro": My (Pointless) Adventure into AI Agents with Java
github.comΒ·10hΒ·
Discuss: DEV
🌈Nannou
Flag this post
A hypothetical search service on S3 with Tantivy and warm cache on NVMe
shayon.devΒ·4dΒ·
πŸ“‹Columnar Storage
Flag this post
New in MicroShift 4.20: The generic device plug-in
developers.redhat.comΒ·2d
πŸ“‹etcd
Flag this post
Reverse Engineering Yaesu FT-70D Firmware Encryption
landaire.netΒ·2dΒ·
Discuss: Hacker News
πŸ”“Binary Exploitation
Flag this post
Final Project Report 2| Apache SeaTunnel Adds Metalake Support
dev.toΒ·1dΒ·
Discuss: DEV
πŸš€Shuttle
Flag this post
Slice-Aware Spoofing Detection in 5G Networks Using Lightweight Machine Learning
arxiv.orgΒ·1d
πŸ”WireGuard
Flag this post
MoM – Mixture of Model Service
github.comΒ·3dΒ·
Discuss: Hacker News
πŸ¦™Ollama
Flag this post
Automated Dynamic Resource Provisioning via Reinforcement Learning & Predictive Analytics in AWS EC2
dev.toΒ·1dΒ·
Discuss: DEV
πŸ“±Edge AI
Flag this post
Exhaustive profiling toolkit: elfutils and libdwfl_stacktrace
developers.redhat.comΒ·3d
πŸ“ŠProfiling Tools
Flag this post
Critical Vulnerability in v380 Cameras: How Plaintext Credentials Exposed Millions of Devices
dev.toΒ·16hΒ·
Discuss: DEV
πŸ”eBPF
Flag this post
Krish Naik: Stop Fighting with Kubernetes! Scale Python to 1000s of Machines with Coiled
dev.toΒ·17hΒ·
Discuss: DEV
☸️Kubernetes
Flag this post
Secure DevSecOps Pipelines
dev.toΒ·6hΒ·
Discuss: DEV
πŸ”§DevOps
Flag this post