🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
⚙️ Mechanical Sympathy

Cache Alignment, Memory Access Patterns, Hardware Awareness, False Sharing

Part 1: A Deep Dive into Rust and C Memory Interoperability
notashes.me·16h·
Discuss: Hacker News, r/programming
🧠Memory Allocators
Lightweight Backbone Networks Only Require Adaptive Lightweight Self-Attention Mechanisms
arxiv.org·3h
🧠LLM Inference
AI Clouds Are Flying Blind: The Illusion of Runtime Protection
thenewstack.io·12h
🖥GPUs
Let's hax0r a GC… (eventually)
h4x0r.org·16h·
Discuss: Lobsters, Hacker News, r/programming
🧠Memory Allocation Strategies
No Customer Left Behind: A Self-balancing Task Scheduler
engineering.lucioai.com·15h·
Discuss: r/programming
📅Resource Scheduling
Branch Prediction Demystified
joegm.github.io·8h·
Discuss: Hacker News
🧮Compute Optimization
AMD's Z2 Extreme flies past Intel's Lunar Lake in new gaming benchmarks — MSI Claw 8 running at 17W favors the Z2E by roughly 8.5%, lead drops to 6% at 30W
tomshardware.com·21h
🔐Hardware Security
Microsegmentation for developers
infoworld.com·22h
🌐Distributed systems
On SP1’s Precompiles
mycelias.xyz·4h
⚙️Language Runtimes
TSMC Discovers Potential Leak of Advanced Chipmaking Tech
bloomberg.com·1h
💻Chips
How MLB keeps fans connected to the game – one cache hit at a time
cloud.google.com·15h
🖥GPUs
From 245TB Density to Gen6 Throughput: Micron's New SSDs – Storagereview.com
storagereview.com·12h·
Discuss: Hacker News
📱Embedded Databases
Taming Eventual Consistency—Applying Principles of Structured Concurrency to Distributed Systems
developer.porn·15h·
Discuss: r/SoftwareEngineering, r/programming
🌐Distributed systems
🎲 Enter the Matrix
blog.webb.page·10h
📄File Formats
Towards Alignment Auditing as a Numbers-Go-Up Science
lesswrong.com·9h
🛡️AI Safety
I check my Windows PC’s speed with one easy command. Here’s how
nordot.app·17h
⚡Systems Performance
No more flicker
usetrmnl.com·11h
🔐Hardware Security
Building an arena allocator (without malloc)
bsky.app·16h·
Discuss: Bluesky
🧠Memory Allocation Strategies
Software Internals Book Club
eatonphil.com·1h
💾Persistence Strategies
The browser is the next security frontier: how do we secure it?
techzine.eu·20h
🔐Hardware Security
Loading...Loading more...
AboutBlogChangelogRoadmap