Newest Stories
Home
Recent
Comments
Search
Login
13
The eno notation language and libraries
release
eno-lang.org
via
iv
14 days ago
|
cached
|
9 comments
9
5
SpaceX REST API on GitHub
api
github.com
via
minastirid
14 days ago
|
cached
|
no comments
0
3
A Guide to Python's Magic Methods
python
rszalski.github.io
via
Dawny33
14 days ago
|
cached
|
1 comment
1
4
Numbers and Class Hierarchy in Ruby
ruby
medium.com
authored by
mehdi-farsi
14 days ago
|
cached
|
no comments
0
3
Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
☶
pdf
ai
compilers
privacy
programming
arxiv.org
via
Shamar
14 days ago
|
cached
|
2 comments
2
1
Making the Distribution, Part 1 ( 2014 )
linux
funtoo.org
via
chauhankiran
14 days ago
|
cached
|
no comments
0
4
Remote laptop power management using Intel AMT and Dropbear (initramfs) SSH
devops
go
linux
medium.com
authored by
milanaleksic
14 days ago
|
cached
|
no comments
0
27
Oil Shell: Summer Vacation is Over
programming
unix
oilshell.org
authored by
andyc
14 days ago
|
cached
|
8 comments
8
3
AsiaBSDCon 2019
dragonflybsd
event
freebsd
netbsd
openbsd
unix
2019.asiabsdcon.org
via
sevan
15 days ago
|
cached
|
no comments
0
1
Cheap and easy deployment: CaptainDuckDuck (Part 1)
devops
web
blog.florimondmanca.com
via
ishan
15 days ago
|
cached
|
no comments
0
6
The Myth of Metaphor (1995)
pdf
programming
web.cs.wpi.edu
via
calvin
15 days ago
|
cached
|
no comments
0
8
Those Memex Dreams Again
compsci
databases
natecull.org
via
yumaikas
15 days ago
|
cached
|
1 comment
1
3
Windows Command-Line: Introducing the Windows Pseudo Console (ConPTY)
windows
blogs.msdn.microsoft.com
via
chadski
15 days ago
|
cached
|
no comments
0
6
Blocking Compromised Passwords on PyPI
python
security
caremad.io
via
alex_gaynor
15 days ago
|
cached
|
no comments
0
6
Error Handling in Ruby: Part II
ruby
medium.com
authored by
mehdi-farsi
15 days ago
|
cached
|
3 comments
3
9
Typed Clojure in Theory and Practice
pdf
clojure
formalmethods
plt
ambrosebs.com
via
Yogthos
15 days ago
|
cached
|
1 comment
1
4
Inside the die of Intel's 8087 coprocessor chip, root of modern floating point
hardware
historical
reversing
righto.com
via
calvin
15 days ago
|
cached
|
no comments
0
3
Hardware Alternatives to Intel for Security Concerns (2013)
hardware
security
pastebin.com
authored by
nickpsecurity
15 days ago
|
cached
|
4 comments
4
3
Q&A on the Book Agile Methods for Safety-Critical Systems
book
practices
testing
infoq.com
via
yonkeltron
15 days ago
|
cached
|
1 comment
1
7
tzconv - Time converter with timezone fuzzy search
go
programming
github.com
authored by
alexdzyoba
15 days ago
|
cached
|
no comments
0
1
Our Traditions as a Company
culture
practices
medium.com
via
elbrujohalcon
15 days ago
|
cached
|
no comments
0
3
Verifying the Correctness of a Compiler for an Imperative, Programming Language (2011)
☶
pdf
compilers
formalmethods
dspace.jaist.ac.jp
via
nickpsecurity
15 days ago
|
cached
|
no comments
0
21
The Jury is In: Monolithic OS Design is Flawed
☶
pdf
osdev
security
ts.data61.csiro.au
via
nickpsecurity
15 days ago
|
cached
|
15 comments
15
8
The X-Files: Avoiding Concurrency Boilerplate With golang.org/x/sync
go
rodaine.com
authored by
rodaine
15 days ago
|
cached
|
no comments
0
2
GSoC 2018 Reports: Kernel Address Sanitizer, Part 3
netbsd
blog.netbsd.org
via
pstef
15 days ago
|
cached
|
no comments
0
<< Page 18
|
Page 20 >>