I Built a One File Edge Probe to Tell Me When Time Is Lying
physical-ai.ghost.ioยท2dยท
Discuss: Hacker News
๐Ÿ‘๏ธObservability
Flag this post
Deploying Temporal on AWS ECS with Terraform
papnori.github.ioยท1dยท
Discuss: Hacker News
๐Ÿ›๏ธTechnical Architecture
Flag this post
Show HN: In-Browser AI Background Noise Removal for Video/Audio Files
chromewebstore.google.comยท16hยท
Discuss: Hacker News
๐Ÿค–AI
Flag this post
Building Yantra: A Visual Workflow Automation Engine
patali.devยท3dยท
Discuss: Hacker News
๐Ÿ›๏ธTechnical Architecture
Flag this post
AI Function Calling: Composing and Decomposing Functions for Complex Tasks
lightcapai.medium.comยท1dยท
Discuss: Hacker News
๐Ÿ”ŒAPI Design
Flag this post
GDM: Consistency Training Helps Limit Sycophancy and Jailbreaks in Gemini 2.5 Flash
lesswrong.comยท1d
๐Ÿ”Post-Quantum Cryptography
Flag this post
PgEdge and CloudNativePG Partnership: Simplifying Distributed Postgres on K8s
pgedge.comยท17hยท
Discuss: Hacker News
๐Ÿ”ŒAPI Design
Flag this post
Japan Mino Kogyo Ransomware Attack
pbxscience.comยท13hยท
Discuss: Hacker News
๐Ÿ”’Security Engineering
Flag this post
Absurd Workflows: Durable Execution With Just Postgres
lucumr.pocoo.orgยท3dยท
๐Ÿ”ŒAPI Design
Flag this post
Writing an LLM from scratch, part 27 โ€“ what's left, and what's next?
gilesthomas.comยท2dยท
Discuss: Hacker News
โš™๏ธAI Infrastructure
Flag this post
Mathematics solves problems by pen and paper. CS helps us to go far beyond that
cacm.acm.orgยท3dยท
Discuss: Hacker News
๐Ÿ”Post-Quantum Cryptography
Flag this post
Complexity fills the space it's given
wilsoniumite.comยท22mยท
Discuss: Hacker News
๐Ÿฆ€Rust Systems
Flag this post
Code execution with MCP: Building more efficient agents
anthropic.comยท2dยท
Discuss: Hacker News
๐Ÿ‘๏ธObservability
Flag this post
Ask HN: Ayar Labs, how big a deal are optical chiplets?
news.ycombinator.comยท7mยท
Discuss: Hacker News
๐Ÿ›๏ธTechnical Architecture
Flag this post
Show HN: I got fired so I built a bank statement converter
aussiebankstatements.comยท1dยท
Discuss: Hacker News
๐Ÿช™cryptocurrency
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.orgยท2dยท
Discuss: Hacker News
๐Ÿ”ŒAPI Design
Flag this post
What's Next in Customer Identity and Access Management
kuppingercole.comยท2dยท
Discuss: Hacker News
๐Ÿ”’Security Engineering
Flag this post
Benchmarking The AMD EPYC 9V64H: Azure HBv5's Custom AMD CPU With HBM3
phoronix.comยท1dยท
๐Ÿ›๏ธTechnical Architecture
Flag this post
LLKV: Rust, SQL, Apache Arrow, and zero-copy KV Storage
github.comยท9hยท
Discuss: Hacker News
๐Ÿฆ€Rust Systems
Flag this post
Building auraphone โ€“ Bluetooth phone to phone who did I just meet
andrewarrow.devยท1dยท
๐Ÿ›๏ธTechnical Architecture
Flag this post