Performance Archaeology, Access Patterns, Memory Hierarchies, Optimization Forensics

The Library Method: Understanding @cache
dev.to·17h·
Discuss: DEV
Cache Theory
Profiling Your Code: 5 Tips to Significantly Boost Performance
usenix.org·17h
📊Performance Profiling
Interviewing Intel's Chief Architect of x86 Cores
chipsandcheese.com·1d·
🧲RISC-V Archaeology
GoMem is a high-performance memory allocator library for Go
github.com·16h
🧠Memory Allocators
An enough week
blog.mitrichev.ch·23h·
🧮Z3 Solver
How to Tame Varnish Memory Usage Safely
fastly.com·1d
🎯Performance Forensics
OBCache: Optimal Brain KV Cache Pruning for Efficient Long-Context LLM Inference
arxiv.org·15h
💻Local LLMs
From Static Rate Limiting to Adaptive Traffic Management in Airbnb’s Key-Value Store
medium.com·1d
🌊Streaming Systems
Z8 G4 - 768gb RAM - CPU inference?
reddit.com·21h·
Discuss: r/homelab
🖥️Modern CPU
CPU Cache-Friendly Data Structures in Go: 10x Speed with Same Algorithm
skoredin.pro·4d·
💨Cache Optimization
Construction of new 1130 MRAM memory board completed
rescue1130.blogspot.com·37m·
🛠️Greaseweazle
Learning from software errors – Part 3: A Mars probe gets out of control
heise.de·11h
📞Session Types
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.com·2d
🧬PostgreSQL Forensics
Is the End of Detection-Based Security Here?
thenewstack.io·3h
🎯Threat Hunting
When AI Remembers Too Much – Persistent Behaviors in Agents’ Memory
unit42.paloaltonetworks.com·21h
🔲Cellular Automata
Att&Df: Update the Operating System's "Dead Drop"
zenodo.org·1d·
Discuss: Hacker News
🛡️eBPF Security
QUIC! Jump to User Space!
hackaday.com·3h
🌐Network Protocols
We Benchmarked DuckDB, SQLite, and Pandas on 1M Rows: Here’s What Happened
kdnuggets.com·5h
💾SQLite
LLM Optimization Notes: Memory, Compute and Inference Techniques
gaurigupta19.github.io·4d·
Discuss: Hacker News
💻Local LLMs