Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·1d
💎Information Crystallography
I Replaced My Toaster's Firmware and Now I'm a Fugitive
jxself.org·19h
🔓Hacking
How Do SSDs Work?
extremetech.com·22h·
Discuss: Hacker News
🧲Magnetic Recording
Somatic mutation and selection at population scale
nature.com·2d·
Discuss: Hacker News
🧬Copy Number Variants
Progress being made in porting AMD OpenSIL Turin PoC to Coreboot in a Gigabyte MZ33-AR1
blog.3mdeb.com·14h·
🖥️Terminal Renaissance
Show HN: Twoway, a Go package for HPKE encrypted request-response flows
github.com·2d·
🔑Cryptographic Protocols
Building A Real-Time Communication System Using Go and WebSocket
dev.to·14h·
Discuss: DEV
🌐WebSocket Framing
From Millions to Billions
geocod.io·3d·
Discuss: Hacker News
🗄️Database Internals
AI-Driven Ethical Risk Assessment & Mitigation in Supply Chain Compliance
dev.to·6h·
Discuss: DEV
🔗Supply Chain
Mind the Gap: Quantifying Vocabulary Mismatch in E-Commerce Site Search
searchhub.io·1d·
Discuss: Hacker News
📈Search Quality
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.com·1d·
🧮Algebraic Datatypes
Nearest Neighbor CCP-Based Molecular Sequence Analysis
arxiv.org·1d
🔄Burrows-Wheeler
OCaml 5.4 Release: New Features, Fixes, and More
tarides.com·3h·
🔗Functional Compilers
Investigating targeted “payroll pirate” attacks affecting US universities
microsoft.com·1d
🎯NTLM Attacks
Experimenting with ACL2 and Claude Code
mikedodds.org·22h·
Discuss: Hacker News
👑Isabelle
PHP's New URI Extension
thephp.foundation·22h·
Discuss: Hacker News
🌐Web Standards
Using Pydantic for ETL - Clean, Validate, and Transform Data with Confidence
dev.to·1d·
Discuss: DEV
Format Validation
Can AI Co-Design Distributed Systems? Scaling from 1 GPU to 1k
harvard-edge.github.io·12h·
Discuss: Hacker News
🎯Performance Proofs
The Day I Hacked XCTrack
blog.syrac.org·19h·
Discuss: Hacker News
🔐PKI Archaeology
Three Solutions to Nondeterminism in AI
blog.hellas.ai·2d·
Discuss: Hacker News
🎯Performance Proofs