The Structure of Data
theprogrammersparadox.blogspot.com·3d·
🗂Data structures
Flag this post
Build a Trust Zone Protected IoT Device (Trust Raspberry PI)
pixelstech.net·1d
🛡️ARM TrustZone
Flag this post
What is a distribution? Top 5 functions of a distro:
medium.com·15h
🔗Dependency Resolution
Flag this post
The “Most Hated” CSS Feature: tan()
css-tricks.com·19h
🖋Typography
Flag this post
2.7B Buildings
tech.marksblogg.com·9h·
Discuss: Hacker News
🌳B-tree Archaeology
Flag this post
You can't cURL a Border
drobinin.com·11h·
Discuss: Hacker News
🔗Data Provenance
Flag this post
Introducing Agent-o-rama: build, trace, evaluate, and monitor stateful LLM agents in Java or Clojure
blog.redplanetlabs.com·18h·
Discuss: Hacker News
🌊Streaming Systems
Flag this post
State of Terminal Emulators in 2025: The Errant Champions
jeffquast.com·2d·
📟Terminal Typography
Flag this post
Improving in chess is hard. I built the world's most accurate human-like chess AI to help me.
mbuffett.com·4d·
Discuss: Hacker News
🔲Cellular Automata
Flag this post
Vectorizing for Fun and Performance
ibm.com·5d·
Discuss: Hacker News
SIMD Vectorization
Flag this post
Absurd Workflows: Durable Execution With Just Postgres
lucumr.pocoo.org·1d·
🌊Streaming Databases
Flag this post
Generation at the Speed of Thought: Speculative Decoding
bittere.substack.com·2d·
Discuss: Substack
🚀SIMD Text Processing
Flag this post
Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.com·1d
💣ZIP Vulnerabilities
Flag this post
A Multimodal Dataset for Indoor Radio Mapping with 3D Point Clouds and RSSI
arxiv.org·6h
📻Homebrew Protocols
Flag this post
A Comparative Analysis of LLM Adaptation: SFT, LoRA, and ICL in Data-Scarce Scenarios
arxiv.org·6h
💻Local LLMs
Flag this post
Part 3: Building Station Station - Agent-OS Workflow in Action
dev.to·6h·
Discuss: DEV
🦋Format Metamorphosis
Flag this post
CoT-Saliency: Unified Chain-of-Thought Reasoning for Heterogeneous Saliency Tasks
arxiv.org·6h
📊Learned Metrics
Flag this post
Is Crowdsourcing a Puppet Show? Detecting a New Type of Fraud in Online Platforms
arxiv.org·6h
🎫Kerberos Attacks
Flag this post