Question from notation in "Hacker's Delight" by Warren
reddit.com·10h·
♻️Boehm GC
Flag this post
Three Moo Tokens
gist.github.com·3d·
Discuss: Hacker News
🔓Binary Exploitation
Flag this post
Dear Developer: Your Database Isn't a File Cabinet!
cdn.com·1d·
Discuss: DEV
🗄️Database Internals
Flag this post
From Raw to Refined: Data Pipeline Architecture at Scale
dev.to·13h·
Discuss: DEV
🔥DataFusion
Flag this post
Understanding PL/SQL Collections: Associative Arrays, Nested Tables, and VARRAYs
dev.to·7h·
Discuss: DEV
🎨ART Trees
Flag this post
Crawler-Detect: A PHP Library for Bot Detection
dev.to·5h·
Discuss: DEV
🌊Warp
Flag this post
It’s Not Always DNS: Exploring How Name Resolution Works
cefboud.com·1d·
Discuss: r/programming
🌐Network Protocols
Flag this post
Code Prompting: a better way to communicate with LLMs
alprielse.xyz·1d·
Discuss: Hacker News
💬Prompt Engineering
Flag this post
Management Pseudo-Science
laser-coder.net·18h·
Discuss: Hacker News
🔍Reverse Engineering
Flag this post
Taming the Data Beast: Build Pipelines That Bend, Not Break by Arvind Sundararajan
dev.to·1d·
Discuss: DEV
🔧Data Engineering
Flag this post
I Tried to Teach AI to Click Buttons, and It Missed by 500 Pixels
dev.to·50m·
Discuss: DEV
🎨Creative Coding
Flag this post
eBPF and Go in Production: Network Monitoring and Security
skoredin.pro·1d·
Discuss: Hacker News
🔍eBPF
Flag this post
Evolution Strategies at the Hyperscale
eshyperscale.github.io·2d·
Discuss: Hacker News
🔲Cellular Automata
Flag this post
Markdown Is Holding You Back
newsletter.bphogan.com·14h·
Discuss: Hacker News
📝Markdown
Flag this post
Don't Refactor Like Uncle Bob (Second Edition)
theaxolot.wordpress.com·4d·
🦗Pest
Flag this post
Evaluating Web Browsing Agents for Some Practical Use Cases
theautomatedoperator.substack.com·1d·
Discuss: Substack
📈Prometheus
Flag this post
Build Your First AI App in 10 Minutes: A Non-Coder’s Guide to AWS AI 🚀
dev.to·6h·
Discuss: DEV
💬Prompt Engineering
Flag this post
Show HN: Lite³ – A JSON-Compatible Zero-Copy Serialization Format in 9.3 KB of C
📄FlatBuffers
Flag this post
Indefiniteness makes lattice reduction easier
arxiv.org·2d
🔢Homomorphic Encryption
Flag this post
Remote Control, Done Right: Reviewing the Comet Pro Remote KVM
medium.com·2h·
Discuss: Hacker News
🔐Hardware Security
Flag this post