Active
Recent
Comments
Search
Login
Login
microsoft.com: 105 stories from 51 submitters
20
The Impact of Generative AI on Critical Thinking
pdf
ai
cogsci
microsoft.com
via
toast
26 days ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
7
Division and Modulus for Computer Scientists (2003)
plt
programming
microsoft.com
via
andyc
7 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
7
Fast Arithmetic with Tagged Integers - A Plea for Hardware Support (2022)
programming
microsoft.com
via
andyc
7 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
15
Desugaring Haskell's do-Notation into Applicative Operations
pdf
haskell
plt
microsoft.com
via
xoranth
7 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
7
Uncursing the ncurses: Memory corruption vulnerabilities found in library
security
microsoft.com
via
fro
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Static TypeScript: An Implementation of a Static Compiler for the TypeScript Language
compilers
programming
microsoft.com
via
andyc
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
Programming with Implicit Values, Functions, and Control (2019)
pdf
plt
microsoft.com
via
5d22b
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
32
FP^2: Fully in-Place Functional Programming
pdf
plt
microsoft.com
via
brendan
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
10
New macOS vulnerability, Migraine, could bypass System Integrity Protection
mac
security
microsoft.com
via
fro
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
17
A fork() in the road
pdf
osdev
microsoft.com
via
fanf
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
41 comments
41
25
CHERIoT: Rethinking security for low-cost embedded systems
hardware
security
microsoft.com
authored by
david_chisnall
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
35 comments
35
4
Combining Model Checking and Testing
pdf
formalmethods
testing
microsoft.com
via
akkartik
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
4
Rethinking the Library OS from the Top Down (2011)
pdf
osdev
windows
microsoft.com
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
Automating String Processing in Spreadsheets using Input-Output Examples (2011)
plt
programming
microsoft.com
via
gcd
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Uncovering a macOS App Sandbox escape vulnerability: A deep dive into CVE-2022-26706
mac
security
microsoft.com
via
fro
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
3
Paxos Made Simple (2001)
pdf
distributed
microsoft.com
via
yonkeltron
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
Designing a Framework for Conversational Interfaces
ai
api
cogsci
microsoft.com
authored by
ztellman
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
26
A fork() in the road (2019)
☶
pdf
osdev
unix
microsoft.com
via
dbremner
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
25
Mimalloc: Free List Sharding in Action
pdf
c
performance
microsoft.com
via
francesco
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
25 comments
25
24
Microsoft finds new macOS vulnerability, Shrootless, that could bypass System Integrity Protection
mac
security
microsoft.com
via
fro
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
8
Perceus: Garbage Free Reference Counting with Reuse
☶
pdf
programming
microsoft.com
via
dbremner
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
A deep-dive into the SolarWinds Serv-U SSH vulnerability
reversing
security
microsoft.com
via
calvin
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
17
C--: A Portable Assembly Language (1997)
pdf
assembly
plt
microsoft.com
via
sebastian
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
2
New sophisticated email-based attack from NOBELIUM
security
microsoft.com
via
lattera
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Hints for Computer System Design
pdf
programming
microsoft.com
via
thrgamon
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
Page 2 >>