Lazy Backup (2006)
๐File Systems
Flag this post
Dive into Systems
โ๏ธSystems Programming
Flag this post
original โ
โกPerformance Engineering
Flag this post
The state of SIMD in Rust in 2025
๐SIMD Programming
Flag this post
AI Slop vs. OSS Security
๐ก๏ธAI Security
Flag this post
Show HN: Kumi โ a portable, declarative, functional core for business logic
๐Dependent Types
Flag this post
Minimalistic CLAUDE.md for new projects: Follow SOLID, DRY, YAGNI, KISS
๐จIncremental Compilation
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
๐ก๏ธAI Security
Flag this post
The Next Big Thing
๐Performance
Flag this post
Why stop at 1 million tokens when you can have 10? My journey to extreme context on a gaming GPU. [P]
๐ฑEdge AI
Flag this post
Supply Chain Exploitation of Secure ROS 2 Systems: A Proof-of-Concept on Autonomous Platform Compromise via Keystore Exfiltration
arxiv.orgยท1d
๐Capability Systems
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
๐Binary Exploitation
Flag this post
ShadowLogic: Backdoors in Any Whitebox LLM
arxiv.orgยท1d
๐ก๏ธAI Security
Flag this post
IoMT Vulnerabilities Putting Patient Health Data at Risk
hackernoon.comยท2d
๐Security
Flag this post
Help with local AI
๐ Home Automation
Flag this post
Loading...Loading more...