Lowering in Reverse
buttondown.com·1d
📝Parser Combinators
Flag this post
The Case Against PGVector
alex-jacobs.com·1d·
Discuss: Hacker News
🗄️Database Internals
Flag this post
H-FA: A Hybrid Floating-Point and Logarithmic Approach to Hardware Accelerated FlashAttention
arxiv.org·1d
🔓Lock-Free Programming
Flag this post
flowengineR: A Modular and Extensible Framework for Fair and Reproducible Workflow Design in R
arxiv.org·1d
Performance Engineering
Flag this post
Should I use Tanstack table or write my own?
tanstack.com·1d·
Discuss: r/reactjs
🗄️Database Internals
Flag this post
How to build a Heapless Vector using `MaybeUninit<T>` for Better Performance.
dev.to·17h·
Discuss: DEV
🦀Rust Macros
Flag this post
Computer Science Fundamentals: From Binary Systems to Algorithms
dev.to·13h·
Discuss: DEV
🌳Data Structures
Flag this post
How Does the Internet Work? TCP/IP, DNS & Network Infrastructure Explained
the-ultimate-gadget-guide.blogspot.com·1d
🌐Network Protocols
Flag this post
How Datadog Built a Custom Database to Ingest Billions of Metrics Per Second
blog.bytebytego.com·14h
🗄️Database Internals
Flag this post
Beyond computational assumptions: How BGKW replaced hardness with isolation
reddit.com·6h·
Discuss: r/compsci
🔓Lock-Free Programming
Flag this post
Fluent Visitors: revisiting a classic design pattern
neilmadden.blog·8h
🔨Compiler Design
Flag this post
Balancing Cost, Power, and AI Performance
oreilly.com·11h
Performance Engineering
Flag this post
Creating a Linux Application Using VSCodium, Cline, OpenRouter, and Claude
taosecurity.blogspot.com·1d·
⌨️CLI Development
Flag this post
Geonum – geometric number library for unlimited dimensions with O(1) complexity
github.com·1d·
Discuss: Hacker News
SIMD
Flag this post
BoxLambda OS Software Architecture, First Draft
epsilon537.github.io·2h·
Discuss: Hacker News
💻Operating Systems
Flag this post
MemSearcher: Training LLMs to Reason, Search and Manage Memory via End-to-End Reinforcement Learning
arxiv.org·48m
📝Parsing
Flag this post
Two-Parameter R\'enyi Information Quantities with Applications to Privacy Amplification and Soft Covering
arxiv.org·48m
🗳️Raft Consensus
Flag this post
When Your Hash Becomes a String: Hunting Ruby's Million-to-One Memory Bug
mensfeld.pl·17h·
Discuss: Hacker News
🛡️Memory Safety
Flag this post
Implementing JWT Authentication in Rust using Axum
dev.to·20h·
Discuss: DEV
🔄CRDT
Flag this post
A Soft‑Fork Proposal for Blockchain‑Based Distributed AI Computation
hackernoon.com·1d
🗳️Raft Consensus
Flag this post