Tea-Fi Redefines DeFi: One SuperApp. Infinite Yield. Powered by $TEA
hackernoon.comยท20h
๐Ÿ’ฐTigerBeetle
Flag this post
Database Redis: Vulnerability allows execution of malicious code
heise.deยท18h
๐Ÿ’พCache Design
Flag this post
A Note on Notes: Towards Scalable Anonymous Payments via Evolving Nullifiers and Oblivious Synchronization
eprint.iacr.orgยท3d
๐Ÿ”“Lock-Free Programming
Flag this post
Lowering in Reverse
buttondown.comยท1d
๐Ÿ“Parser Combinators
Flag this post
Intel vPro Is First Silicon-Based Fleet Management on Microsoft Intune
newsroom.intel.comยท15h
๐Ÿ”eBPF
Flag this post
Cutting LLM Batch Inference Time in Half: Dynamic Prefix Bucketing at Scale
daft.aiยท14hยท
Discuss: Hacker News
๐Ÿ—๏ธNUMA
Flag this post
Rust Testing Framework: Build Reliable Code with Built-In Unit and Integration Tests
dev.toยท13hยท
Discuss: DEV
๐Ÿฆ€Rust Macros
Flag this post
Hacking the Color BASIC PRINT command โ€“ part 7
subethasoftware.comยท13h
๐Ÿฆ€Rust Macros
Flag this post
Understanding Solidity Transparent Upgradeable Proxy Pattern - A Practical Guide
github.comยท16hยท
Discuss: DEV
๐Ÿ”„CRDT
Flag this post
C++ move semantics from scratch (2022)
cbarrete.comยท1dยท
๐Ÿฆ€Rust Lifetimes
Flag this post
Sable and Able: A Tale of Two ASIs
lesswrong.comยท1h
๐Ÿ”Capability Systems
Flag this post
You Shouldn't Use ORMs
diploi.comยท19hยท
Discuss: Hacker News
๐Ÿ—„๏ธDatabase Internals
Flag this post
The Evolution from RAG to Agentic RAG to Agent Memory
leoniemonigatti.comยท19hยท
Discuss: Hacker News
๐Ÿง Memory Models
Flag this post
Creating Lisp Systems
renato.athaydes.comยท34mยท
Discuss: Hacker News
๐ŸญCode Generation
Flag this post
No Cap, This Memory Slaps: Breaking Through the OLTP Memory Wall
danglingpointers.substack.comยท5dยท
Discuss: Substack
๐Ÿ“‹Columnar Storage
Flag this post
Prompt Injection as an Emerging Threat: Evaluating the Resilience of Large Language Models
arxiv.orgยท1d
โš™๏ธJIT Compilation
Flag this post
Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime
dev.toยท1dยท
Discuss: DEV
๐Ÿ”Capability Systems
Flag this post
Readable Code Is Unreadable
blog.wilsonb.comยท23hยท
Discuss: Hacker News
๐ŸญCode Generation
Flag this post
Attacking macOS XPC Helpers: Protocol Reverse Engineering and Interface Analysis
tonygo.techยท3dยท
๐Ÿ”“Lock-Free Programming
Flag this post