From VS Code to Helix
ergaster.org·6d·
🦀Programming
Flag this post
Notes by djb on using Fil-C with Debian multiarch
cr.yp.to·5d·
🦀Programming
Flag this post
WASM-Adventure
github.com·4d·
🦀Programming
Flag this post
Reinventing Government with the Databricks Data Intelligence Platform
databricks.com·5d
🦀Programming
Flag this post
Hilarious Ted Talk bio: “he sold the second most expensive picture at his first exhibition — without really being able to paint.”
statmodeling.stat.columbia.edu·3d
🦀Programming
Flag this post
Roadmap for Improving the Type Checker
forums.swift.org·5d·
🦀Programming
Flag this post
Kafka is Fast – I'll use Postgres
topicpartition.io·6d·
🦀Programming
Flag this post
AI scrapers request commented scripts
cryptography.dog·4d·
🦀Programming
Flag this post
Beyond the Partnership: How 100+ Customers Are Already Transforming Business with Databricks and Palantir
databricks.com·5d
🦀Programming
Flag this post
Introducing Aardvark: OpenAI’s agentic security researcher
openai.com·5d·
🦀Programming
Flag this post
Measuring characteristics of TCP connections at Internet scale
blog.cloudflare.com·6d·
Discuss: Hacker News
🦀Programming
Flag this post
Adding Customizable Frame Contrast to KDE Plasma
akselmo.dev·6d·
🦀Programming
Flag this post
Observations on browsing economics job market candidates
marginalrevolution.com·3d
🦀Programming
Flag this post
GHC 9.14.1-rc1 is now available
discourse.haskell.org·5d·
🦀Programming
Flag this post
This is your brain without sleep
news.mit.edu·6d·
🦀Programming
Flag this post
October 31 Wikipedia featured article
en.wikipedia.org·5d
🦀Programming
Flag this post
Defending QUIC from acknowledgement-based DDoS attacks
blog.cloudflare.com·6d·
Discuss: Hacker News
🦀Programming
Flag this post
Delta Sharing Top 10 Frequently Asked Questions, Answered - Part 1
databricks.com·5d
🦀Programming
Flag this post
How to build your own VPN, or: the history of WARP
blog.cloudflare.com·6d·
Discuss: Hacker News
🦀Programming
Flag this post
Anonymous credentials: rate-limiting bots and agents without compromising privacy
blog.cloudflare.com·5d·
Discuss: Hacker News
🦀Programming
Flag this post