syscall write man function signature
man7.orgยท21hยท
๐Ÿ”„io_uring
Flag this post
Comparing Integers and Doubles
databasearchitects.blogspot.comยท1dยท
Discuss: Hacker News
๐Ÿ’ฐTigerBeetle
Flag this post
Embulk into the Maintenance Mode
embulk.orgยท1dยท
Discuss: Hacker News
๐Ÿ“ฆNix Flakes
Flag this post
๐Ÿฌ MySQL โ€” The Complete Guide for Developers (2025 Edition)
dev.mysql.comยท1dยท
Discuss: DEV
๐Ÿ—„๏ธDatabase Internals
Flag this post
Mixture-of-Experts explained with PyTorch implementation
lightcapai.medium.comยท1dยท
Discuss: Hacker News
๐Ÿ”ฅPyTorch
Flag this post
Branching With or Without PII: The Future of Environments
neon.comยท2dยท
Discuss: Hacker News
๐Ÿ”€Vitess
Flag this post
The memory fabric for enterprise AI
memorilabs.aiยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธMemory Safety
Flag this post
The "Vibe-Coding" Epidemic
app.codalio.comยท1dยท
Discuss: DEV
๐ŸŽญProgram Synthesis
Flag this post
Show HN: AI-built tools with security by default
news.ycombinator.comยท22hยท
Discuss: Hacker News
๐Ÿ›ก๏ธAI Security
Flag this post
Understanding the Impact of Proportionality in Approval-Based Multiwinner Elections
arxiv.orgยท1d
๐Ÿ•Vector Clocks
Flag this post
๐Ÿš€ Today I Solved: Find the Largest/Smallest Subarray with Sum = K
dev.toยท2dยท
Discuss: DEV
๐ŸŒณData Structures
Flag this post
Battle-Tested Architectures: Databricks vs Snowflake for Scalable Enterprise AI
dev.toยท6hยท
Discuss: DEV
๐Ÿ’งMaterialize
Flag this post
What It Takes to Build a Modern Social Network in Django
github.comยท1dยท
Discuss: DEV
๐Ÿ”—ActivityPub
Flag this post
The MCP Reckoning => Why the Protocol Never Worked and What Comes Next
dev.toยท1dยท
Discuss: DEV
๐Ÿ“ฆFolly
Flag this post
Designing Data-Intensive Applications โ€” Chapter 2: Data Models and Query Languages
dev.toยท2dยท
Discuss: DEV
๐Ÿ—„๏ธDatabase Internals
Flag this post
Beyond "The End of Cybersecurity": Refusal as Default Architecture
dev.toยท15hยท
Discuss: DEV
๐Ÿ”’Security
Flag this post
Fair Multi-agent Persuasion with Submodular Constraints
arxiv.orgยท2d
๐ŸŽฎGame Theory
Flag this post
Two can keep a secret if one is dead. So please share everything with at least one person.
lesswrong.comยท1d
๐Ÿ“‹Protocol Design
Flag this post
Edge Computing for Real-Time Data Processing
dev.toยท4hยท
Discuss: DEV
๐ŸŒEdge Computing
Flag this post
Show HN: Privacy Experiment โ€“ Rewriting HTTPS, TLS, and TCP/IP Packet Headers
news.ycombinator.comยท3dยท
Discuss: Hacker News
๐Ÿ”eBPF
Flag this post