How to approach low-level programming.
reddit.comยท6hยท
Discuss: r/embedded
๐Ÿ”ŒMicrocontrollers
WASM in the Kernel: Tales of Triumph and Trouble
riptides.ioยท7hยท
Discuss: Hacker News
๐ŸŒWASM Runtimes
Java Backend Coding Technology: Writing Code in the Era of AI #Version 1.1
dev.toยท1hยท
Discuss: DEV
๐ŸŽฎLanguage Ergonomics
A Generic Vector Implementation in C using void*, func*
github.comยท5hยท
๐Ÿช„C Metaprogramming
Evading the Watchful Eye: A Red Teamerโ€™s Guide to EDR Bypass Techniques
medium.comยท9h
๐Ÿท๏ธMemory Tagging
Beating the L1 cache with value speculation (2021)
mazzo.liยท5hยท
Discuss: Lobsters
๐Ÿ”ฎBranch Predictors
Ask HN: Systems Development Path
news.ycombinator.comยท2dยท
Discuss: Hacker News
๐Ÿฆ€MIR Optimization
LLM Optimization Notes: Memory, Compute and Inference Techniques
gaurigupta19.github.ioยท5hยท
Discuss: Hacker News
๐Ÿ—บ๏ธRegion Inference
The Making of Digital Identity โ€“ The Birth of Digital Authentication
syntheticauth.aiยท1dยท
๐Ÿ›ก๏ธCapability Security
Write in C โ€“ Let it Be
wiki.tcl-lang.orgยท3hยท
Discuss: Hacker News
๐Ÿช„C Metaprogramming
Souvenir
deprogrammaticaipsum.comยท18h
๐Ÿ”—Weak References
The Next Computing Revolution: Bringing Processing Inside Memory
computer.orgยท22mยท
Discuss: Hacker News
๐Ÿง Memory Models
Recurse Checkins
404wolf.comยท20h
๐Ÿ”„Bootstrapping
Understanding Linux Namespaces: A Guide to Process Isolation
dev.toยท4hยท
Discuss: DEV
๐Ÿ›ก๏ธCapability VMs
Absolute beginners guide to Emacs (2012)
jesshamrick.comยท5hยท
Discuss: Hacker News
๐Ÿ“Editor Buffers
What Happens Behind the Scenes When You Run Python Code
fusion-institute.comยท12hยท
Discuss: DEV
๐Ÿ”งError Recovery
Simple hash map in C, for learning purpose
reddit.comยท10hยท
๐Ÿท๏ธSymbol Interning
Why We Need SIMD
parallelprogrammer.substack.comยท18hยท
Discuss: Substack
๐Ÿ”€SIMD Programming
C2|Q>: A Robust Framework for Bridging Classical and Quantum Software Development
arxiv.orgยท17h
๐Ÿ”ฌNanopasses
Self-Extracting F3
buttondown.comยท3h
๐Ÿ“ŠRow Polymorphism