Hash Function Testing, Collision Analysis, Distribution Quality, Benchmarks

EP189: How to Design Good APIs
blog.bytebytego.com·16h
🎨API Design
Flag this post
Coordinated SSH Attacks: Moving Beyond Single-IP Bans
godhani.me·11h·
Discuss: Hacker News
🌐Network Security
Flag this post
Jordium.Snowflake.NET — A Fast and Lightweight Distributed ID Generator for .NET
dev.to·1h·
Discuss: DEV
➡️Apache Arrow
Flag this post
Low Latency Optimization: Understanding Huge Pages (Part 1)
hudsonrivertrading.com·1h·
Discuss: Hacker News
💭Virtual Memory
Flag this post
🔐 Building an Ultra-Secure Token Generator in Python (Multi-Source Entropy + HMAC + Pepper)
dev.to·1d·
Discuss: DEV
🔐ChaCha20
Flag this post
Coinbase Ventures-Backed Supra Offers $1M Bounty to Beat Its Parallel EVM Execution Engine
hackernoon.com·1d
🚀Performance
Flag this post
libwifi: an 802.11 frame parsing and generation library written in C
libwifi.so·10h·
Discuss: Hacker News
QUIC Protocol
Flag this post
Machine Text Detectors are Membership Inference Attacks
paperium.net·1d·
Discuss: DEV
📝Parsing
Flag this post
Transaction-Oriented Programming
btmc.substack.com·19h·
Discuss: Substack
🧠Memory Models
Flag this post
Biometric Key Derivation for Decentralized Identity Using Fuzzy Extractors
blog.shodipoayomide.com·2d·
Discuss: Hacker News
🔢Homomorphic Encryption
Flag this post
Refactoring Legacy: Part 1 - DTO's & Value Objects
clegginabox.co.uk·13h·
Discuss: r/programming
🎨API Design
Flag this post
Intro to Routing: Mixture-of-Experts and Expert Choice
neelsomaniblog.com·1d·
Discuss: Hacker News
💬Prompt Engineering
Flag this post
Protobuf Meets Valhalla: Hacking with Java Value Classes (JEP 401)
dariobalinzo.medium.com·1d·
Discuss: Hacker News
📄FlatBuffers
Flag this post
Scaling HNSWs
antirez.com·4d·
🐦Cuckoo Hashing
Flag this post
Finding a CPU Design Bug in the Xbox 360 (2018)
randomascii.wordpress.com·8h·
🚧Memory Barriers
Flag this post
Can Language Models Optimize Real-World Repositories on Real Workloads?
swefficiency.com·21h·
Discuss: Hacker News
📊Profile-Guided Optimization
Flag this post
Solving Project Euler #45
loriculus.org·9h·
Discuss: Hacker News
📊Dynamic Programming
Flag this post
Xen exploitation part 1: XSA-105, from nobody to root
blog.quarkslab.com·17h·
Discuss: Hacker News
🦅Falco
Flag this post
Asynchronous Wait-Free Runtime Verification and Enforcement of Linearizability
arxiv.org·2d
Formal Verification
Flag this post
Op Color Plots
aphyr.com·1d
🔍DTrace
Flag this post