Kawaiicon 3 - Day 2
rodger.donaldson.gen.nz·1h
🧮Functional Programming
Flag this post
What Makes a Good QA?
news.ycombinator.com·18h·
Discuss: Hacker News
🧮Functional Programming
Flag this post
Exceptions in Cranelift and Wasmtime
cfallin.org·1d·
🌳Elm
Flag this post
AI Agents Observability with OpenTelemetry and the VictoriaMetrics Stack
victoriametrics.com·1d
🌳Elm
Flag this post
Zero-Knowledge Architecture: Privacy by Design
dev.to·7h·
Discuss: DEV
💾ZFS
Flag this post
Half life of Frameworks
rsdoiel.github.io·6h
🌳Elm
Flag this post
Making MCP Tool Calls Scriptable with mcp_cli
joshbeckman.org·16h·
Discuss: Hacker News
🌳Elm
Flag this post
How to Choose a Dependency: Build vs Buy, Risk Management, and More
hackernoon.com·18h
❄️Nix
Flag this post
The Complexity Cliff: Why Reasoning Models Work Right Up Until They Don't
rewire.it·2d·
Discuss: Hacker News
🌳Elm
Flag this post
Common Manual Testing Techniques
dev.to·3h·
Discuss: DEV
🌳Elm
Flag this post
On Pretraining for Project-Level Code Completion
paperium.net·3h·
Discuss: DEV
🌳Elm
Flag this post
Stop vibe coding your unit tests
andy-gallagher.com·2d·
Discuss: Hacker News
📐Haskell
Flag this post
An ARENA 6.0 Capstone: Model Organism of Encoded Reasoning
lesswrong.com·2d
🧮Functional Programming
Flag this post
Spinning Plates
dylanamartin.com·12h·
Discuss: Hacker News
🌳Elm
Flag this post
Creating Lisp Systems
renato.athaydes.com·3d·
Discuss: Hacker News
📐Haskell
Flag this post
Building an AI-Powered Resume Tailoring Pipeline: Lessons Learned
github.com·17h·
Discuss: DEV
🌳Elm
Flag this post
How to turn Defender & Sentinel alerts into actionable threat intelligence
vmray.com·17h
🌳Elm
Flag this post
Diving into Rama: A Clojure LSH Vector Search Experiment
shtanglitza.ai·8h·
Discuss: Hacker News
🌳Elm
Flag this post
The Three Laws of AI Security
auth0.com·1d
🌳Elm
Flag this post