The Transformer and the Hash
lesswrong.com·4h
🌳Merkle Trees
Flag this post
Indexing, Hashing & Query Optimization in SQL
dev.to·2d·
Discuss: DEV
🔍Query Optimization
Flag this post
One Weird Hashing Trick
notes.hella.cheap·1d·
🧮Vector Databases
Flag this post
Space-Efficient and Output-Sensitive Algorithms for the Longest Common Bitonic Subsequence
arxiv.org·20h
🎯Van Emde Boas Trees
Flag this post
Client Trust: Clerk's free credential stuffing killer
clerk.com·4h·
Discuss: Hacker News
🔒Security
Flag this post
Biometric Key Derivation for Decentralized Identity Using Fuzzy Extractors
blog.shodipoayomide.com·5h·
Discuss: Hacker News
🔢Homomorphic Encryption
Flag this post
Python Security Guide: Password Hashing, Encryption, Digital Signatures, and Secure Coding Practices
dev.to·5h·
Discuss: DEV
🔐Cryptography
Flag this post
What Is Graph Anomaly Detection
puppygraph.com·10h·
Discuss: Hacker News
🕸️Graph Databases
Flag this post
How I Reverse Engineered a High-Volume Solana Arbitrage Bot
clumsy-geranium-e59.notion.site·5h·
Discuss: r/programming
💰TigerBeetle
Flag this post
Every Attention Matters: An Efficient Hybrid Architecture for Long-ContextReasoning
paperium.net·21h·
Discuss: DEV
📱Edge AI
Flag this post
Hybrid Hash Join – breaking the memory wall of streams join
timeplus.com·1d·
Discuss: Hacker News
💰TigerBeetle
Flag this post
Reverse Engineering Yaesu FT-70D Firmware Encryption
landaire.net·18h·
Discuss: Hacker News
🔓Binary Exploitation
Flag this post
How to store passwords in your database
systemdesignbutsimple.com·3d·
Discuss: r/programming
#️⃣Hash Tables
Flag this post
Ramanujan's Hidden Clue to the Riemann Hypothesis
link.springer.com·18h·
Discuss: DEV
Category Theory
Flag this post
Explaining Financial Models by Deleting Transactions
building.nubank.com·1d
💰TigerBeetle
Flag this post
LLMs Are Randomized Algorithms
towardsdatascience.com·8h
🔀Procedural Generation
Flag this post
🧠 Understanding Ransomware and Malware: How Cybercriminals Lock and Exploit Your Data
medium.com·8h·
Discuss: DEV
🦠Malware Analysis
Flag this post
First-class custom smart pointers
nadrieril.github.io·15h·
🔀Crossbeam
Flag this post
The PUMP.NETWORK experiment: using gambling to calculate trust
news.ycombinator.com·21h·
Discuss: Hacker News
🕸️Graph Theory
Flag this post