Weekly Bookmarks
inkdroid.org·20h
🏠Homelab Archaeology
Flag this post
The Treachery of Image Files
beyondloom.com·21h
🔠Terminal Fonts
Flag this post
Cure - Verification-First Programming for the BEAM
cure-lang.org·15h·
Discuss: Lobsters
⚖️Verification Calculi
Flag this post
MS-DOS Development with GCC
hackaday.com·1d·
Discuss: Hacker News
🧲RISC-V Archaeology
Flag this post
Comparing Data Serialization Formats: Code, Size, and Performance
qt.io·12h·
Discuss: Hacker News
🔧KAITAI
Flag this post
Introducing Agent-o-rama: build, trace, evaluate, and monitor stateful LLM agents in Java or Clojure
blog.redplanetlabs.com·8h·
Discuss: Hacker News
🌊Streaming Systems
Flag this post
Changelog #300
rust-analyzer.github.io·1d·
Discuss: r/rust
🦀Rust Macros
Flag this post
Why agents DO NOT write most of our code - a reality check
dev.to·16h·
Discuss: DEV
Proof Automation
Flag this post
Engineering a Rust optimization quiz
fasterthanli.me·2d·
Discuss: Hacker News
🦀Rust Macros
Flag this post
Nimony v0.2 – early preview of Nim 3.0's compiler
nim-lang.github.io·14h·
Discuss: Hacker News
🔗Concatenative Programming
Flag this post
Masked Softmax Layers in PyTorch
mcognetta.github.io·10h·
Discuss: Hacker News
🧪Binary Fuzzing
Flag this post
Do I want Coders to Code?
yeikoff.xyz·3h·
Discuss: Hacker News
📏Code Metrics
Flag this post
How I Built gemini-imagen: A CLI for Google Gemini Image Generation
dev.to·8h·
Discuss: DEV
🤖Archive Automation
Flag this post
Deflanderization for Game Dialogue: Balancing Character Authenticity with TaskExecution in LLM-based NPCs
dev.to·11h·
Discuss: DEV
🏛Digital humanities
Flag this post
Learning to program "recycles" preexisting F-P pop codes of logical algorithms
jneurosci.org·1d·
Discuss: Hacker News
🔲Cellular Automata
Flag this post
Speedrunning an RL Environment
sidb.in·2d·
Discuss: Hacker News
⚔️Lean Tactics
Flag this post
Show HN: Using GitHub Pages as zero-cost APT repository with global CDN
vejeta.com·2d·
Discuss: Hacker News
❄️Nix Flakes
Flag this post
Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.com·1d
💣ZIP Vulnerabilities
Flag this post
Product Designer's workflow for prototyping with Cursor
hvpandya.com·1d·
Discuss: Hacker News
🌀Brotli Internals
Flag this post