Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.com·15h
💣ZIP Vulnerabilities
Flag this post
A Short Introduction to Categorical Logic
youtube.com·4d
🔀Category Theory
Flag this post
Challenge: Improve Multilingual ASR Performance for Mozilla
community.mozilladatacollective.com·10h·
Discuss: Hacker News
🎙️Whisper
Flag this post
Viruses of the Mind
grokipedia.com·15h·
Discuss: Hacker News
🔲Cellular Automata
Flag this post
Show HN: Using GitHub Pages as zero-cost APT repository with global CDN
vejeta.com·1d·
Discuss: Hacker News
❄️Nix Flakes
Flag this post
You Don't Need Types in Ruby
zhisme.com·3d·
Discuss: Hacker News
💧Liquid Types
Flag this post
Show HN: Everything it took to run an LLM at 10k tok/s on H200s
relace.ai·4d·
Discuss: Hacker News
📏Code Metrics
Flag this post
The Hardest Bug to Fix Is Ambiguity
dev.to·40m·
Discuss: DEV
⚖️Hoare Logic
Flag this post
Codeminer42 Dev Weekly #85
blog.codeminer42.com·2d
🔩Systems Programming
Flag this post
wastrel, a profligate implementation of webassembly
wingolog.org·3d·
🌐WASI
Flag this post
🚀 Exploring Go’s Core Features in Depth
dev.to·15h·
Discuss: DEV
🏗️Compiler Archaeology
Flag this post
Java's Agentic Framework Boom Is a Code Smell
gnanaguru.com·1d·
Discuss: Hacker News
🔌Interface Evolution
Flag this post
A Roller Coaster Of Emotions
deprogrammaticaipsum.com·2h
🖥Retro Computing
Flag this post
Shape-Shifting AI: Making Models That Adapt to Data
dev.to·20h·
Discuss: DEV
📊Quantization
Flag this post
Day 22: Python Even-Odd Counter – Count Even and Odd Integers in a List with Type Checks
dev.to·9h·
Discuss: DEV
🧮Algebraic Datatypes
Flag this post
Phased DMD: Few-step Distribution Matching Distillation via Score Matching within Subintervals
arxiv.org·19m
🌀Fractal Compression
Flag this post
Reactive Tree Management in Nuxt 4: How I Modeled Complex Hierarchies with Pinia
dev.to·1d·
Discuss: DEV
🗄️Database Internals
Flag this post
DDD and the Simplicity Gospel
oluatte.com·1d·
📏Code Metrics
Flag this post
Let's Poison Your LLM Application: A Security Wake-Up Call
dev.to·3d·
Discuss: DEV
🧪Binary Fuzzing
Flag this post
Synthesized Generative Modeling via Graph-Constrained Semantic Embedding
dev.to·12h·
Discuss: DEV
🧮Vector Embeddings
Flag this post