Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·1d
📚Stack Allocation
Flag this post
Breaking Monoliths Taught Me How to Fix Data
blog.matterbeam.com·15h·
Discuss: Hacker News
↔️Bidirectional Sync
Flag this post
Opportunistically Parallel Lambda Calculus
dl.acm.org·1d·
Discuss: Hacker News
🌱Minimal Languages
Flag this post
Java Generics and Collections • Maurice Naftalin & Stuart Marks • GOTO 2025
youtube.com·1d
🔗Go Generics
Flag this post
Fungus: The Befunge CPU(2015)
bedroomlan.org·5h·
Discuss: Hacker News
🌳B+ Trees
Flag this post
🚀 Go Faster: Cutting the Slack in GC with Smart Memory Allocation
dev.to·2d·
Discuss: DEV
🧠Memory Allocators
Flag this post
Myths Programmers Believe about CPU Caches
software.rajivprab.com·1d·
Discuss: Hacker News
🧠Memory Models
Flag this post
How Distributed ACID Transactions Work in TiDB
pingcap.com·15h
📮Message Queues
Flag this post
The Structure of Data
theprogrammersparadox.blogspot.com·12h·
🪢Rope Data Structures
Flag this post
Fil-C: A memory-safe C implementation
lwn.net·3d·
Discuss: Hacker News
📚Stack Data Structures
Flag this post
Nirvana: A Specialized Generalist Model With Task-Aware Memory Mechanism
arxiv.org·1d
🧠Memory Ordering
Flag this post
Durable execution workflow system based on Postgres
github.com·17h·
Discuss: Hacker News
📡Erlang BEAM
Flag this post
Minimal Sufficiency: A Principle ‘Similar’ to End-to-End
cacm.acm.org·13h·
Discuss: Hacker News
📡Protocol Stacks
Flag this post
Why DFS Topological Sort Writes Nodes on Backtracking
dev.to·13h·
Discuss: DEV
🤐Zipper Structures
Flag this post
My first fifteen compilers (2019)
blog.sigplan.org·10h·
Discuss: Hacker News
🔬Nanopasses
Flag this post
Clean Code: Functions and Error Handling in Go: From Chaos to Clarity [Part 1]
hackernoon.com·1d
🛡️Error Handling
Flag this post
A hitchhiker's guide to CUDA programming
seanzhang.me·1d·
Discuss: Hacker News
🔀SIMD Programming
Flag this post
Process World, Object-Oriented Mind
aethermug.com·2d·
Discuss: Hacker News
💬Error Message Design
Flag this post
Proving Authenticated Key Exchange via Memory-Efficient Reductions
eprint.iacr.org·2d
📡Binary Protocols
Flag this post
Oops, My UUIDs Collided
alexsci.com·12h·
Discuss: Hacker News
🔗Hash Functions
Flag this post