Managing dependency graph in a large codebase
tweag.ioยท1d
๐Ÿ“ŠDependency Graphs
Links 9/19/2025
nakedcapitalism.comยท9h
๐Ÿ“กRSS
Choice of Schematron Processors for Running XSpec Tests
medium.comยท3h
๐Ÿ“‹Document Grammar
A deep dive into Apache Kafka's KRaft protocol
developers.redhat.comยท2dยท
Discuss: Hacker News
๐ŸคConsensus Protocols
Pentagon Bans Tech Vendors From Using China-Based Personnel After ProPublica Investigation
propublica.orgยท11hยท
Discuss: Hacker News
๐Ÿ›กCybersecurity
enjoy-digital/litex
github.comยท2d
๐Ÿ–ฅ๏ธModern Terminals
Which browser first introduced private/incognito mode?
techspot.comยท3d
๐Ÿ Personal Archives
Why Creating a Personal 'Podcast' Can Help You Study
lifehacker.comยท5h
๐Ÿง Personal Knowledge Base
LLMs and Beyond: All Roads Lead to Latent Space
aiprospects.substack.comยท2dยท
Discuss: Substack
๐Ÿ’ปLocal LLMs
Russian fake-news network, led by an ex-Florida sheriff's deputy, storms back into action with 200+ new sites
theregister.comยท1dยท
Discuss: Hacker News
๐Ÿ›กCybersecurity
A society built on scent: How ants maintain a one-to-one match between neurons and odor receptors
phys.orgยท5h
๐Ÿ”ฒCellular Automata
<b>World's first AI-designed </b>viruses<b> </b><b>a step towards AI-generated life</b>
nature.comยท7hยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
OpenAI: Models are programmed to make stuff up instead of admitting ignorance
theregister.comยท2dยท
Discuss: Hacker News
๐Ÿ”—Parser Combinators
TruFin plc (TRFNF) Q2 2025 Earnings Call Transcript
seekingalpha.comยท1h
๐Ÿ–ฅ๏ธTerminal Renaissance
Agent Evaluation Metrics: What to Measure and Why Itโ€™s Crucial
dev.toยท2dยท
Discuss: DEV
๐Ÿ‘๏ธObservatory Systems
VulAgent: Hypothesis-Validation based Multi-Agent Vulnerability Detection
arxiv.orgยท3d
โšกProof Automation
Vectorization in Python for Machine Learning
dev.toยท3dยท
Discuss: DEV
โšกSIMD Vectorization
Educational Byte: What Happens to Someone's Crypto if They Die?
hackernoon.comยท1d
๐ŸŒณArchive Merkle Trees