Recapping our inaugural Axe-con Mini event
deque.comยท23h
โ๏ธProof Engineering
Flag this post
Federico Biancuzzi, Shane Warden, & Anders Hejlsberg
deprogrammaticaipsum.comยท2d
๐Nordic Shell
Flag this post
Coercin, Monopsony in American Manufacturing: Evidence from Alabama Prison Labor
๐ผTape Algebra
Flag this post
To write secure code, be less gullible than your AI
stackoverflow.blogยท1d
๐Code Metrics
Flag this post
Masked Softmax Layers in PyTorch
๐งชBinary Fuzzing
Flag this post
The Next Big Thing
๐งFPGA Preservation
Flag this post
Quoting Barry Warsaw
simonwillison.netยท1d
๐ฆRust Macros
Flag this post
From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
๐ก๏ธWASM Security
Flag this post
Algorithmic Trust Calibration via Adversarial Multi-Agent Simulations
๐ฏThreat Hunting
Flag this post
Japanese polygon theorem
johndcook.comยท4h
๐Computational Geometry
Flag this post
Reasoning Models Sometimes Output Illegible Chains of Thought
arxiv.orgยท2d
๐ง Intelligence Compression
Flag this post
I Benchmarked 3 Go Concurrency Patterns. The "Fastest" One Would Destroy Production
๐Stream Processing
Flag this post
Don't Just Search, Understand: Semantic Path Planning Agent for Spherical Tensegrity Robots in Unknown Environments
arxiv.orgยท1d
๐Computational Geometry
Flag this post
Loading...Loading more...