Indexing, Hashing, and Query
dev.to·11h·
Discuss: DEV
🔗Hash Functions
Fun with HyperLogLog and SIMD
vaktibabat.github.io·1d·
🔢Bit Manipulation
Building a HashMap in Rust - Part 1: What's a Hashmap?
cglab.ca·5d
🔗Hash Functions
Understanding RS256: A Deep Dive into Asymmetric Encryption
dev.to·1d·
Discuss: DEV
🔗Hash Functions
Cuckoo hashing improves SIMD hash tables
reiner.org·1d·
🏗️Hash Tables
Highly concurrent in-memory counter in GoLang
engineering.grab.com·5h
🧠Memory Models
The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.ai·13h·
Discuss: Hacker News
🛡️Capability Security
Round Robin vs Least Connection vs IP Hash? Which Load Balancing Algorithm Wins?
javarevisited.substack.com·1d·
🌍HTTP Servers
"Bridge sorting" problem
reddit.com·14h·
Discuss: r/compsci
🪢Rope Data Structures
Bulk operations in Boost.Bloom
bannalia.blogspot.com·1d·
Discuss: r/cpp
🌸Bloom Indexing
A Primer on Memory Consistency and Cache Coherence, Second Edition
link.springer.com·11h·
Discuss: r/programming
🧠Memory Models
INDEXING - HASHING - AND -QUERY
dev.to·2h·
Discuss: DEV
🌸Bloom Indexing
A content defined chunking algorithm testbed
github.com·1d·
Discuss: Hacker News
🔄Deduplication
Indexing, Hashing & Query Optimization
dev.to·2d·
Discuss: DEV
🌸Bloom Indexing
Using Palm Jumeirah's Design to Visualize the Elliptic Curve Method
codingpirate.com·6h·
Discuss: Hacker News
🔢Algebraic Datatypes
Reflections on Designing a Search Autocomplete System
torontostudygroup.github.io·22h·
Discuss: DEV
🌿Trie Structures
Top 15 DBMS Interview Questions
analyticsvidhya.com·1d
📈Query Optimization
DNS encryption protocols aren’t equal (and your ISP hopes you don’t know why)
makeuseof.com·7h
🛡️Security Type Systems
SoK: Kicking CAN Down the Road. Systematizing CAN Security Knowledge
arxiv.org·1h
🛡️Security Type Systems