Lang’s theorem — Pt. IV: a mixed-characteristic variant
ayoucis.wordpress.com·11h
λLambda Encodings
Flag this post
Overfitting vs. Underfitting: Making Sense of the Bias-Variance Trade-Off
towardsdatascience.com·19h
🧠Machine Learning
Flag this post
Mad drunk on the mead of poetry
blog.zarfhome.com·1d
🧪CBOR Fuzzing
Flag this post
Simulating Rework
third-bit.com·2d
Incremental Computation
Flag this post
Modern X86 Assembly Language Programming • Daniel Kusswurm & Matt Godbolt • GOTO 2025
youtube.com·2d
⚙️Modern Assembly
Flag this post
Fair Screen – Detect Cluely/Interview Coder Kind of Interview Cheating Tools
fairscreen.co·7h·
Discuss: Hacker News
🛡️eBPF Programs
Flag this post
Adaptive Clock Distribution Network Synchronization via Dynamic FPGA Reconfiguration & Bayesian Inference
dev.to·18h·
Discuss: DEV
🔍FPGA Verification
Flag this post
Codeminer42 Dev Weekly #88
blog.codeminer42.com·1d
👁️Observatory Systems
Flag this post
Do You Know Where Your Load-Bearing Code Is?
codemanship.wordpress.com·14h·
Discuss: Hacker News
📏Code Metrics
Flag this post
Perennial Technical Reading List
parallelprogrammer.substack.com·3d·
Discuss: Substack
🔩Systems Programming
Flag this post
Day 43: Python Valid Parentheses Checker, Stack-Based Bracket Validation with Mapping and Loop Scanning
dev.to·1h·
Discuss: DEV
Format Verification
Flag this post
AI in QA: how to use Generative AI in testing without creating technical debt
techradar.com·17h
Proof Automation
Flag this post
Zoomer: Powering AI Performance at Meta’s Scale Through Intelligent Debugging and Optimization
engineering.fb.com·1d
📊Performance Profiling
Flag this post
NASA does software testing and QA (2020)
functionize.com·1d·
Discuss: Hacker News
⚙️Proof Engineering
Flag this post
The Limits of Formal Security Models – Dorothy E. Denning (1999)
faculty.nps.edu·3d·
Discuss: Hacker News
🔒WASM Capabilities
Flag this post
How to Use Unsafe in Go Without Killing Your Service
dev.to·1d·
Discuss: DEV
🦀Rust Borrowing
Flag this post
Spiral Development for Hardware Programs
asbuilt.pub·2d·
Discuss: Hacker News
🛡️Error Boundaries
Flag this post
Tech Is Opt-In
coppolaemilio.com·10h·
Discuss: Hacker News
🔌Operating system internals
Flag this post
eBPF and Go in Production: Network Monitoring and Security
skoredin.pro·1d·
Discuss: Hacker News
🛡️eBPF Programs
Flag this post
AI Caught in a Lie: A Corrective Conversation with Perplexity AI
shastasfog.wordpress.com·2d·
Discuss: Hacker News
🧪Binary Fuzzing
Flag this post