Modern C and initializing an array
subethasoftware.com·1d
🗂Data structures
Three Solutions to Nondeterminism in AI
blog.hellas.ai·2d·
Discuss: Hacker News
🎯Performance Proofs
Trusted Execution Environments? More Like "Trust Us, Bro" Environments
libroot.org·10h·
Discuss: Hacker News
🛡️RISC-V Security
Slip – A Lisp System in JavaScript
lisperator.net·15h·
Discuss: Hacker News
🔗Lisp
SSH Security: Why You Should Touch to Verify
ubicloud.com·21h·
Discuss: Hacker News
🔒Hardware Attestation
Randomized and quantum approximate matrix multiplication
arxiv.org·1d
🔐Quantum Cryptography
Understanding conflict resolution and avoidance in PostgreSQL: a complete guide
pgedge.com·9h·
Discuss: r/programming
🛡️Byzantine Fault Tolerance
Implementing ZADD If Key Exists
rozumem.xyz·23h·
Discuss: Hacker News
Redis Internals
Sandy Maguire: Theorems for Free Redux
reasonablypolymorphic.com·1d·
Discuss: Hacker News
λLambda Encodings
Build an Unbreakable EVM Read Stack in Python: Async Web3.py, ABIs, Proxies, and Decimals
dev.to·9h·
Discuss: DEV
🔌Interface Evolution
Ask HN: Claude Code Alternative
news.ycombinator.com·16h·
Discuss: Hacker News
🪟Awesome windows command-line
Building the Reasoning Engine at Axiom
axiommath.ai·9h·
Discuss: Hacker News
⚔️Lean Tactics
Tired of Passwords? Meet Passkeys: Your Keychain to a Passwordless Future
dev.to·18h·
Discuss: DEV
🔓Password Cracking
When Python can't thread: a deep-dive into the GIL's impact
pythonspeed.com·17h·
Discuss: Hacker News
🔩Systems Programming
Getting a Hypergraph of Functions to a Browser
systeminit.com·1d·
Discuss: Hacker News
📐E-graphs
Let's Write a Macro in Rust
hackeryarn.com·13h·
Discuss: Hacker News
🦀Rust Macros
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.com·14h·
Discuss: Hacker News
🎫Kerberos Exploitation
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.org·1d
📐Compression Bounds
Fast Matrix Multiply on an Apple GPU
percisely.xyz·3d·
SIMD Vectorization