Inferring multiple helper Dafny assertions with LLMs
arxiv.org·2h
🔧programming language design
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.org·13h·
Discuss: Hacker News
📲local-first software
Flag this post
Creating a Linux Application Using VSCodium, Cline, OpenRouter, and Claude
taosecurity.blogspot.com·6h·
📲local-first software
Flag this post
How to get the GOT address from a PLT stub using GDB
rafaelbeirigo.github.io·1d·
Discuss: Hacker News
🔧programming language design
Flag this post
A Friendly Tour of Process Memory on Linux
0xkato.xyz·8h·
Discuss: Hacker News
🔧programming language design
Flag this post
Josef Machytka: PostgreSQL 18 enables data‑checksums by default
credativ.de·22h
🔧programming language design
Flag this post
Doo: A Simple, Fast Programming Language Built on Rust and LLVM
news.ycombinator.com·22h·
Discuss: Hacker News
🔧programming language design
Flag this post
Becoming a Core Developer
stefaniemolin.com·1d
🔧programming language design
Flag this post
The Rust Book Brown University Chapter 4.3 Incorrect Permission
reddit.com·3d·
Discuss: r/rust
🔧programming language design
Flag this post
Borrow checker says “No”! An error that scares me every single time!
polymonster.co.uk·4d·
🔧programming language design
Flag this post
I Built a One File Edge Probe to Tell Me When Time Is Lying
physical-ai.ghost.io·17h·
Discuss: Hacker News
📲local-first software
Flag this post
dcaf: An implementation of the ACE-OAuth framework
docs.rs·13h·
Discuss: Hacker News
📲local-first software
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·4d
🔧programming language design
Flag this post
Growing Threat of npm Supply Chain Attacks and the Runtime Fix That Stops It
riptides.io·15h·
Discuss: r/node
🧰software development practices
Flag this post
Quoting Barry Warsaw
simonwillison.net·10h
🔧programming language design
Flag this post
We found embedding indexing bottleneck in the least expected place: JSON parsing
nixiesearch.substack.com·14h·
Discuss: Substack
🔄Functional Programming
Flag this post
Analysis of NGate malware campaign (NFC relay)
cert.pl·21h
📲local-first software
Flag this post
Why agents do not write most of our code – a reality check
octomind.dev·13h·
Discuss: Hacker News
🧰software development practices
Flag this post
DynBERG: Dynamic BERT-based Graph neural network for financial fraud detection
arxiv.org·2h
🔄Functional Programming
Flag this post
For Synthetic Situations
lesswrong.com·15h
🧮Algebraic Effects
Flag this post