From Raw to Refined: Data Pipeline Architecture at Scale
dev.to·9h·
Discuss: DEV
⚙️Batch Processing
Flag this post
The Easiest Way to Build a Type Checker
jimmyhmiller.com·11h·
Discuss: Hacker News
Bidirectional Typing
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.org·1d
🎭Cultural Informatics
Flag this post
It's LIT! Reliability-Optimized LLMs with Inspectable Tools
arxiv.org·3d
🌀Brotli Internals
Flag this post
rpki-client seeks €300K in funding by 2026 to sustain development
discoverbsd.com·2d
🔌Operating system internals
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
stack.int.mov·8h·
Discuss: Hacker News
🔌Operating system internals
Flag this post
Taming the Beast: The Move To Declarative API Validation in Kubernetes - Yongrui Lin, Google
youtube.com·1d
Format Validation
Flag this post
Automatic Syntax Error Recovery (2020)
tratt.net·19h·
Discuss: Lobsters
🌳Incremental Parsing
Flag this post
People test Nano Banana with PDF paper to whiteboard. I did the exact opposite
quickchat.ai·7h·
Discuss: Hacker News
📄Text Chunking
Flag this post
What Now? Handling Errors in Large Systems
brooker.co.za·3d·
Discuss: Hacker News
🛡️Error Boundaries
Flag this post
Lang’s theorem — Pt. IV: a mixed-characteristic variant
ayoucis.wordpress.com·9h
λLambda Encodings
Flag this post
What is GNU Emacs and do you want a copy? (1986)
gnu.org·7h·
Discuss: Hacker News
📟Terminals
Flag this post
No Deus ex Machina
thestoicprogrammer.substack.com·20h·
Discuss: Substack
🔩Systems Programming
Flag this post
Common Coding Mistakes at Every Level (And How to Fix Them)
dev.to·1d·
Discuss: DEV
📜Proof Carrying Code
Flag this post
Thankful for Memory Managed Languages
mooreds.com·11h·
Discuss: Hacker News
🔩Systems Programming
Flag this post
Meet the SWHID: The end of broken links, broken builds
softwareheritage.org·2d
🏺Format Archaeology
Flag this post
Python Certifi and Custom CAs
zufallsheld.de·13h·
Discuss: Hacker News
🧪CBOR Fuzzing
Flag this post
10 Essential Java Libraries - How Essential Are They Really?
hackernoon.com·1d
📝Concrete Syntax
Flag this post
Verification Is Not the Silver Bullet
alperenkeles.com·4d·
Discuss: Hacker News
🎯Performance Proofs
Flag this post
This Week in Security: Cloudflare Wasn’t DNS, BADAUDIO, and Not a Vuln
hackaday.com·1d
🔓Hacking
Flag this post