-
The Emacsification of Software
-
First public macOS kernel memory corruption exploit on Apple M5
-
What we learned using AI agents to refactor a monolith
-
C++26 Shipped a SIMD Library Nobody Asked For
-
Concurrency - Understanding the BEAM Limits
-
How do I write Elixir tests?
-
The First CVE Wave: Signs That AI-Assisted Vulnerability Discovery Is Reshaping Disclosure Volumes
-
The Picturing Relation
-
Bidirectional Typechecking That Does Not Stop
-
Welcome to ORDER BY jungle
-
Sovereign Tech Fund invests over €1 million in KDE software development
-
Intellectual Control (2019)
-
What it takes to run Stack Overflow (2013)
-
Points are a weird and inconsistent unit of measure
-
Bug Archeology: Solving a decade-old Swift/C++ mystery (with LLMs)
-
Mandy: ActivityPub on Goblins
-
Building a clock from salvaged Vacuum Fluorescent Displays
-
Shell Tool Testing
-
HDD Firmware Hacking Part 1
-
claude-for-legal: A suite of plugins for legal workflows
-
Classic 7 is a Windows 10 LTSC mod to look 1:1 to Windows 7
-
Setting up a free *.city.state.us locality domain
-
The <noscript> element as a trap
-
SQL’s ORDER BY Has Come a Long Way
-
Spam Resistant Forges
More