Yes, you should understand backprop (2016)
karpathy.medium.com·58m·
Discuss: Hacker News
🧠Learned Codecs
Flag this post
Agentic AI and Security
martinfowler.com·4d·
💻Local LLMs
Flag this post
Show HN: IRCd in Pure Bash
github.com·2d·
Discuss: Hacker News
Shell Verification
Flag this post
Per-request isolation in TinyKVM explained
fwsgonzo.medium.com·1d·
Discuss: Hacker News
🌊Streaming Systems
Flag this post
Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Edge AI Systems
dev.to·1d·
Discuss: DEV
🔐Homomorphic Encryption
Flag this post
Roadmap for Improving the Type Checker
forums.swift.org·2d·
💧Liquid Types
Flag this post
Show HN: Mach, a new systems language that focuses on being simple and explicit
github.com·1d·
Discuss: Hacker News
🧠Lisp Dialects
Flag this post
Scalable Static Analysis Framework – hardening large C++ codebases (LLVM/Apple)
discourse.llvm.org·3d·
Discuss: Hacker News
📊Static Analysis
Flag this post
Breaking Monoliths Taught Me How to Fix Data
blog.matterbeam.com·1d·
Discuss: Hacker News
👁️Observatory Systems
Flag this post
How AI is Actually Changing Cybersecurity (And Why I'm Paying Attention)
dev.to·18h·
Discuss: DEV
🎯Threat Hunting
Flag this post
Testing Prompt Injection "Defenses": XML vs. Markdown, System vs. User Prompts
schneidenba.ch·3d·
Discuss: Hacker News
Proof Automation
Flag this post
Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Medical Imaging
dev.to·4d·
Discuss: DEV
🔲Lattice Cryptography
Flag this post
Ideology-Based LLMs for Content Moderation
arxiv.org·2d
📰Content Curation
Flag this post
Automated Variant Analysis & Kinship Assignment via Multi-Modal Data Fusion
dev.to·27m·
Discuss: DEV
📜Family History Data
Flag this post
Implementing MQTT 5 in Go: A Deep Dive into Client Design - Part I
dev.to·1d·
Discuss: DEV
📋Format Specification
Flag this post
Reactive Tree Management in Nuxt 4: How I Modeled Complex Hierarchies with Pinia
dev.to·18h·
Discuss: DEV
🗄️Database Internals
Flag this post
A Senior Developer's Guide to the Model Context Protocol
dev.to·1d·
Discuss: DEV
🔌Interface Evolution
Flag this post
How I Use Every Claude Code Feature
blog.sshh.io·6h·
Discuss: Hacker News
Proof Automation
Flag this post
Ask HN: is this a common LLM-assisted development workflow?
news.ycombinator.com·3h·
Discuss: Hacker News
🦋Format Metamorphosis
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·2d
🦠Parasitic Storage
Flag this post