~lobsters | Bookmarks (1962)
-
JPEG XL’s Modular Mode Explained
The new DNG 1.7 specification allows using JPEG XL as the payload codec to store the...
-
Unlocking the NES (for Former Dawn) – Something Nerdy Studios
Definition of unlocktransitive verb3 : to free from restraints or restrictions // the shock unlocked a...
-
Should you use uv’s managed Python in production?
The uv Python packaging tool provides fast replacements for tools like pip, and a variety of...
-
Passwords have problems, but passkeys have more
We had originally planned to go all-in on passkeys for ONCE/Campfire, and we built the early...
-
Categorizing How Distributed Databases Utilize Consensus Algorithms
Distributed databases generally fall into two camps when it comes to architectures for maintaining high availability...
-
James Shore: Testing Without Mocks: A Pattern Language
Automated tests are important. Without them, programmers waste a huge amount of time manually checking and...
-
How To Corrupt An SQLite Database File
An SQLite database is highly resistant to corruption. If an application crash, or an operating-system crash,...
-
RAGs to RIChes — machtiani
The other key booster over traditional RAG is that it indexes in vast amounts of dimensions...
-
New passkey specifications will let users import and export them
Passkeys were introduced two years ago, and they replace traditional passwords with more secure authentication using...
-
a protocol for reliable notifications over a 1 bit fallible connection.
imagine you have two devices, a client and a server, connected in a peculiar way: the...
-
Antithesis: Pioneering Deterministic Hypervisors with FreeBSD and Bhyve | FreeBSD Foundation
Antithesis is at the forefront of conquering one of the toughest parts of software engineering: transforming...
-
jank development update - Moving to LLVM IR
Hi everyone! It's been a few months since the last update and I'm excited to outline...