Debian APT to have hard Rust dependency from May 2026
heise.de·9h
🦀Rust Borrowing
Flag this post
Building Up And Sanding Down
endler.dev·3d
🔩Systems Programming
Flag this post
Headless PHP – as far as I understand the landscape
blog.fortrabbit.com·11h·
Discuss: Hacker News
🌐WASI
Flag this post
The Case That A.I. Is Thinking
newyorker.com·9h·
Discuss: Hacker News
🔲Cellular Automata
Flag this post
The Development of Pie
terathon.com·1d·
Discuss: Hacker News
🔗Concatenative Languages
Flag this post
Becoming the Internet: Weighing the Options
blog.bsprague.com·1d·
Discuss: Hacker News
🕸️Mesh Networks
Flag this post
Making an Easy-to-Install Application in Python
gokmengorgen.net·23h·
📦Package Managers
Flag this post
Pronto: JavaScript Functional Library for Eventuality and Concurrency
crockford.com·2d·
Discuss: Hacker News
gRPC
Flag this post
Product Designer's workflow for prototyping with Cursor
hvpandya.com·1d·
Discuss: Hacker News
🌀Brotli Internals
Flag this post
Building Software That Survives • Michael Nygard & Charles Humble • GOTO 2025
youtube.com·7h
🔐Capability Systems
Flag this post
THE LEAN MEAN MEME MACHINE
dev.to·23h·
Discuss: DEV
⚖️Feed Ranking
Flag this post
Place Capability Graphs: A General-Purpose Model of Rust's Ownership & Borrowing
dl.acm.org·4d·
🦀Rust Borrowing
Flag this post
OpenAI’s Apps SDK: A Developer’s Guide to Getting Started
thenewstack.io·2d
gRPC
Flag this post
A2A adventures
dev.to·2h·
Discuss: DEV
gRPC
Flag this post
Why Multimodal AI Broke the Data Pipeline — And How Daft Is Beating Ray and Spark to Fix It
hackernoon.com·15h
🌊Streaming Algorithms
Flag this post
Why agents DO NOT write most of our code - a reality check
dev.to·11h·
Discuss: DEV
Proof Automation
Flag this post
Show HN: Fast-posit, sw implementation of posit arithmetic in Rust
github.com·4d·
Discuss: Hacker News
🦀Rust Verification
Flag this post
From Scripts to Scale: Python, Mypy, and the Rise of Static Typing
simplethread.com·3d·
Discuss: Hacker News
🎯Gradual Typing
Flag this post
Ehxb | Race Conditions Vulnerabilities I
infosecwriteups.com·11h
🎫Kerberos Attacks
Flag this post
Contrastive Knowledge Transfer and Robust Optimization for Secure Alignment of Large Language Models
arxiv.org·15h
💻Local LLMs
Flag this post