#16 Pronic, oblong, rectangular numbers.... Etymology and History of Math Terms
pballew.blogspot.com·8h·
λLambda Encodings
A Retrospective Survey of 2024/2025 Open Source Supply Chain Compromises
words.filippo.io·23h·
🔓Open Source Software
Sync PUBG and Hardware IDs
github.com·3h·
Discuss: Hacker News
🔒Hardware Attestation
Show HN: Twoway, a Go package for HPKE encrypted request-response flows
github.com·2d·
🔑Cryptographic Protocols
HP Microserver Gen8 ATI Radeon HD 5450 Compatability
techpowerup.com·1d·
Discuss: r/homelab
🖥️Modern Terminals
Intel Simplifying P-State Driver's Energy Model For Newer Core Ultra CPUs
phoronix.com·4h
Homebrew CPUs
SPAD: Specialized Prefill and Decode Hardware for Disaggregated LLM Inference
arxiv.org·1d·
Discuss: r/LLM
💻Local LLMs
Interviewing Intel's Chief Architect of x86 Cores
chipsandcheese.com·1d·
🧲RISC-V Archaeology
A Function Generator From The Past
hackaday.com·20h
Circuit Archaeology
Next steps for BPF support in the GNU toolchain
lwn.net·3d·
🐚Shell Monads
How Calyx Is Solving The $100 Billion Problem That's Fragmenting DeFi Across 19 Blockchains
hackernoon.com·22h
🔗Hash Chains
Intel's open source future in question as exec says he's done carrying the competition
theregister.com·2d·
🔓Open Source Software
AMD and Sony show first technology of the presumed Playstation 6
heise.de·1h
🖥️Terminal Renaissance
Erlang-Red Walkthrough – Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.com·1d·
Discuss: Hacker News
🌐Protocol Synthesis
Running new applications on old glibc
lightofdawn.org·2d·
Discuss: Hacker News
🔗Static Linking
From Passwords to Passkeys
ssg.dev·2d·
Discuss: Hacker News
🔓Hacking
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.com·1d
🔓Hacking
The Library Method: Understanding @cache
dev.to·1d·
Discuss: DEV
Cache Theory
Evaluating Gemini 2.5 Deep Think's math capabilities
epoch.ai·1d·
Discuss: Hacker News
🎯Performance Proofs