MainActor.assumeIsolated, Preconcurrency, and Isolated Conformances
mjtsai.comยท43m
๐Ÿ”ฌRefinement Types
Flag this post
A new paradigm for programming: graph oriented programming
kmx.ioยท23hยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
Flag this post
Show HN: I made a better DOM morphing algorithm
joel.drapper.meยท11hยท
Discuss: Hacker News
๐Ÿฆ‹Format Metamorphosis
Flag this post
Independently verifying Go's reproducible builds
golangweekly.comยท2d
๐Ÿ”„Reproducible Builds
Flag this post
Gemini API File Search: A Web Developer Tutorial
philschmid.deยท23h
๐Ÿค–Archive Automation
Flag this post
Building a highly-available web service without a database
screenshotbot.ioยท2dยท
Discuss: r/programming
๐Ÿ”„Sync Engine
Flag this post
are-dependent-types-actually-erased
chadnauseam.comยท4dยท
Discuss: Hacker News
๐ŸŽฏDependent Types
Flag this post
Tech With Tim: 3 Unique Python Features You NEED To Know
dev.toยท1dยท
Discuss: DEV
๐Ÿ”RegEx Engines
Flag this post
CodeMachine-CLI: How I Learned to Stop Worrying and Let AI Write My Entire Codebase
dev.toยท1dยท
Discuss: DEV
๐Ÿ”ฉSystems Programming
Flag this post
Real-Time Anomaly Detection in Pressure Sensitive Polymer Microfluidics via Bayesian Kalman Filtering
dev.toยท22hยท
Discuss: DEV
๐ŸŒŠStream Processing
Flag this post
Essential Chunking Techniques for Building Better LLM Applications
machinelearningmastery.comยท1d
๐Ÿ“„Text Chunking
Flag this post
Tech With Tim: OpenAIโ€™s New Agent Builder is Insane - Full Tutorial
dev.toยท21hยท
Discuss: DEV
๐ŸŽฎSwitch Archaeology
Flag this post
Through the Eyes of Janus
dev.toยท11hยท
Discuss: DEV
๐Ÿค–AI Curation
Flag this post
Observer-based neural networks for flow estimation and control
arxiv.orgยท1d
๐Ÿง Machine Learning
Flag this post
Insufficiency resulting from mutually exclusivity definitions: The repercussive effect of dependent claims (T 0878/23)
ipkitten.blogspot.comยท5hยท
๐ŸŽฏDependent Preservation
Flag this post
Engineering.ai: A Platform for Teams of AI Engineers in Computational Design
arxiv.orgยท3d
โšกIncremental Computation
Flag this post
Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset
arxiv.orgยท3d
๐Ÿ”Homomorphic Encryption
Flag this post
Tiny GenBI: Lightweight Agent for business analysis
github.comยท2dยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Flag this post