Introdution to cloud-init and bridge networking
h45h.gitlab.io·1d·
Discuss: r/homelab
🏠HomeLab
Flag this post
Artificial intelligence: Nirvana or apocalypse?
mathscholar.org·9m
🔲Cellular Automata
Flag this post
NetHack4 Philosophy
nethack4.org·7h·
Discuss: Hacker News
🔲Cellular Automata
Flag this post
Computational Complexity and Explanations in Physics
gilkalai.wordpress.com·2d
⚛️Quantum Algorithms
Flag this post
A Claude Code Command for Hypothesis
hypothesis.works·2h·
Discuss: Hacker News
🧪Property-Based Testing
Flag this post
When Your Hash Becomes a String: Hunting Ruby's Million-to-One Memory Bug
mensfeld.pl·9h·
Discuss: Hacker News
🦀Rust Borrowing
Flag this post
I built sbsh: Persistent terminal sessions with discovery, profiles, and an API
news.ycombinator.com·1h·
Discuss: Hacker News
🐚Nordic Shell
Flag this post
SUSE Enterprise Linux 16 is here, and its killer feature is digital sovereignty
zdnet.com·4h·
Discuss: Hacker News
🔌Operating system internals
Flag this post
dcaf: An implementation of the ACE-OAuth framework
docs.rs·1d·
Discuss: Hacker News
🌐NetworkProtocols
Flag this post
Show HN: Oodle – Unified Debugging with OpenSearch and Grafana
blog.oodle.ai·5h·
Discuss: Hacker News
👁️System Observability
Flag this post
Transformer-Based Decoding in Concatenated Coding Schemes Under Synchronization Errors
arxiv.org·16h
🔧Reed-Solomon Decoding
Flag this post
Self-Harmony: Learning to Harmonize Self-Supervision and Self-Play in Test-Time Reinforcement Learning
arxiv.org·16h
Incremental Computation
Flag this post
Part 2: Building MCP Servers to Control a Home Coffee Roaster - An Agentic Development Journey with Warp Agent
dev.to·2d·
Discuss: DEV
🏠HomeLab
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
simonwillison.net·1d·
Discuss: Hacker News
🧪Protocol Fuzzing
Flag this post
Production-Ready Rate Limiter in Go: From Side Project to Distributed System
dev.to·1d·
Discuss: DEV
🌊Streaming Systems
Flag this post
Computation as a Game
arxiv.org·16h
🎯Performance Proofs
Flag this post
How Transformer Models Detect Anomalies in System Logs
hackernoon.com·1d
📝Log Parsing
Flag this post
Why agents do not write most of our code – a reality check
octomind.dev·1d·
Discuss: Hacker News
Proof Automation
Flag this post
Uncrossed Multiflows and Applications to Disjoint Paths
arxiv.org·16h
🕸️Network Topology
Flag this post