How to Tame Varnish Memory Usage Safely
fastly.com·3d
🎯Performance Forensics
A disenshittification moment from the land of mass storage
doctorow.medium.com·1d
🧲Magnetic Philosophy
Steve Jobs Signed 1988 NExt Inc. Memo Autograph Founder CEO
yourownmuseum.com·1d·
Discuss: Hacker News
🍎Apple Computing
Apple Nears Deal To Acquire Talent and Technology From Prompt AI
apple.slashdot.org·1d
🍎Apple Computing
Qualcomm Buys Arduino
electronicdesign.com·4d·
Discuss: Hacker News
🦾ARM Cortex-M
Save Your USB-C Plugs From Oblivion
hackaday.com·2h
💾Floppy Imaging
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.com·2d·
🧮Algebraic Datatypes
Next steps for BPF support in the GNU toolchain
lwn.net·3d·
🐚Shell Monads
MIE: New memory protection only in iPhone 17 & Co.
heise.de·2d
🏷️Memory Tagging
The Alien Artifact: DSPy and the Cargo Cult of LLM Optimization
data-monger.com·12h·
Discuss: Hacker News
🔍Vector Forensics
Is Odin Just a More Boring C?
dayvster.com·5d·
🔩Systems Programming
BQN "Macros" with •Decompose (2023)
saltysylvi.github.io·1d·
Discuss: Hacker News
🦀Rust Macros
A Function Generator From The Past
hackaday.com·1d
Circuit Archaeology
🔥 Smart Contracts Explained — The Code That Executes Itself
dev.to·1d·
Discuss: DEV
🔗Blockchain Archives
Intel XPU Manager Deprecates Data Center GPU Max Series & GPU Flex Series
phoronix.com·17h
🖥️Terminal Renaissance
CoMAS: Co-Evolving Multi-Agent Systems via Interaction Rewards
arxiv.org·2d
🔲Cellular Automata
Quantifying Narrative Coherence: A Hybrid Symbolic-Neural Approach for Automated Literary Evaluation
dev.to·3h·
Discuss: DEV
🔤Character Classification
Memory Retrieval and Consolidation in Large Language Models through Function Tokens
arxiv.org·2d
💻Programming languages