Vectorizing for Fun and Performance
ibm.comยท2dยท
Discuss: Hacker News
๐Ÿ”€SIMD Programming
Flag this post
Fungus: The Befunge CPU(2015)
bedroomlan.orgยท1hยท
Discuss: Hacker News
๐ŸŒณB+ Trees
Flag this post
Smart Handling Of Reset Domain Crossings To Non-Resettable Flip-Flops
semiengineering.comยท1d
๐Ÿ“Register Allocation
Flag this post
Squeezing AI into Tiny Spaces: The Integer Revolution
dev.toยท1dยท
Discuss: DEV
๐ŸŽฏBit Vectors
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท19h
๐Ÿ”—Hash Functions
Flag this post
Modern Perfect Hashing
blog.sesse.netยท4dยท
Discuss: Hacker News
๐Ÿ“String Interning
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท1d
๐Ÿ“šStack Allocation
Flag this post
Building a Rules Engine from First Principles
towardsdatascience.comยท1d
โš–๏ธInference Rules
Flag this post
My first fifteen compilers (2019)
blog.sigplan.orgยท6hยท
Discuss: Hacker News
๐Ÿ”ฌNanopasses
Flag this post
Show HN: Fast-posit, sw implementation of posit arithmetic in Rust
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”—Borrowing Extensions
Flag this post
Challenging the Fastest OSS Workflow Engine
obeli.skยท18hยท
๐Ÿ“กErlang BEAM
Flag this post
Interfacing assembly with BASIC via DEFUSR, part 7
subethasoftware.comยท1d
โš™๏ธAssembly
Flag this post
Oops, My UUIDs Collided
alexsci.comยท8hยท
Discuss: Hacker News
๐Ÿ”—Hash Functions
Flag this post
De Bruijn Numerals
text.marvinborner.deยท1dยท
Discuss: Hacker News
ฮปLambda Calculus
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท11h
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post
From Lossy to Lossless Reasoning
manidoraisamy.comยท8hยท
Discuss: Hacker News
๐ŸชœRecursive Descent
Flag this post
Stochastic computing
scottlocklin.wordpress.comยท9h
๐Ÿ–ฅ๏ธLisp Machines
Flag this post
original โ†—
jvt.meยท2h
๐Ÿ indieweb
Flag this post
TinyML is the most impressive piece of software you can run on any ESP32
xda-developers.comยท16h
๐Ÿ’ฌSmalltalk VMs
Flag this post