Pronto: JavaScript Functional Library for Eventuality and Concurrency
crockford.comΒ·1dΒ·
Discuss: Hacker News
πŸ¦€Rust Systems
Flag this post
Machine Scheduler in LLVM – Part II
myhsu.xyzΒ·21hΒ·
Discuss: Hacker News
πŸ¦€Rust Systems
Flag this post
Walkie Talkie, an open source peer-to-peer iOS communicator
github.comΒ·4hΒ·
Discuss: Hacker News
πŸ›οΈTechnical Architecture
Flag this post
Incident Diagnosis in a Symptom-Based World
runbooks.gitlab-static.netΒ·4dΒ·
Discuss: Hacker News
πŸ”„Data Engineering
Flag this post
A/B Testing Could Lead LLMs to Retain Users Instead of Helping Them
newsletter.danielpaleka.comΒ·8hΒ·
Discuss: Hacker News
βš™οΈAI Infrastructure
Flag this post
Breaking Monoliths Taught Me How to Fix Data
blog.matterbeam.comΒ·2dΒ·
Discuss: Hacker News
πŸ—οΈSystem Design
Flag this post
I Used Claude Code to Debug a Nightmare
blendingbits.ioΒ·1dΒ·
Discuss: Hacker News
🚒DevOps Automation
Flag this post
Java's Agentic Framework Boom Is a Code Smell
gnanaguru.comΒ·1dΒ·
Discuss: Hacker News
πŸ›οΈTechnical Architecture
Flag this post
Loro Protocol: a wire protocol designed for real-time CRDT sync
loro.devΒ·1dΒ·
Discuss: Hacker News
πŸ“¨Message Queues
Flag this post
GPU Pro – Master Your AI Workflow
github.comΒ·8hΒ·
Discuss: Hacker News
βš™οΈAI Infrastructure
Flag this post
Linux/WASM
joelseverin.github.ioΒ·1dΒ·
Discuss: Hacker News
πŸ•ΈοΈWASM
Flag this post
Reflections on Trusting Trust (1984)
web.archive.orgΒ·11hΒ·
Discuss: Hacker News
πŸ”Post-Quantum Cryptography
Flag this post
Perfetto: Swiss Army Knife for Linux Client Tracing
lalitm.comΒ·2dΒ·
πŸ¦€Rust Systems
Flag this post
Attacking macOS XPC Helpers: Protocol Reverse Engineering and Interface Analysis
tonygo.techΒ·1dΒ·
πŸ’»Programming
Flag this post
Show HN: Vercel-like deployments on your own VPS
outlap.devΒ·1dΒ·
Discuss: Hacker News
πŸ›οΈTechnical Architecture
Flag this post
eBPF Observability and Continuous Profiling with Parca
fatihkoc.netΒ·6dΒ·
πŸ›οΈTechnical Architecture
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
simonwillison.netΒ·4hΒ·
Discuss: Hacker News
πŸ”’Security Engineering
Flag this post
DDD and the Simplicity Gospel
oluatte.comΒ·1dΒ·
πŸ›οΈTechnical Architecture
Flag this post
Fight context rot with context observability
blog.nilenso.comΒ·5dΒ·
Discuss: Hacker News
πŸ•ΈοΈWASM
Flag this post
Cycle-accurate 6502 emulator as coroutine in Rust
github.comΒ·1dΒ·
πŸ¦€Rust Systems
Flag this post