Memory Hierarchies, Locality Principles, Performance Analysis, Computer Architecture

CPU Cache-Friendly Data Structures in Go: 10x Speed with Same Algorithm
skoredin.pro·13h·
Discuss: Hacker News
💨Cache Optimization
Beating the L1 cache with value speculation (2021)
mazzo.li·4h·
Discuss: Lobsters
CPU Microarchitecture
A Primer on Memory Consistency and Cache Coherence, Second Edition
link.springer.com·1d·
Discuss: r/programming
Cache Coherence
LLM Optimization Notes: Memory, Compute and Inference Techniques
gaurigupta19.github.io·4h·
Discuss: Hacker News
💻Local LLMs
Souvenir
deprogrammaticaipsum.com·17h
🔩Systems Programming
Optimizing Python Loops for Speed and Memory Efficiency with Generators
dev.to·2h·
Discuss: DEV
📝Compiler Design
Why We Created Turso, a Rust-Based Rewrite of SQLite
thenewstack.io·5h
💾SQLite
Achieving 1.2 TB/s Aggregate Bandwidth by Optimizing Distributed Cache Network
juicefs.com·1d·
Discuss: Hacker News
📡Network Stack
Locality, and Temporal-Spatial Hypothesis
brooker.co.za·1d·
Discuss: Hacker News
🌐Archive Topology
These are the tools we use to build and maintain our precious tech, and they're on sale for Amazon Prime Day
tomshardware.com·2h
🎮Switch Archaeology
I built a faster singleflight implementation for Go (zero allocations, ~4x faster than std)
reddit.com·5h·
Discuss: r/golang
🔄Sync Engine
A Complex Qutrit Inside an Octonionic One
golem.ph.utexas.edu·2h
Time Crystals
Confessions of a Perpetual Beginner
80yos.substack.com·4h·
Discuss: Substack
🎯Gradual Typing
On This Day in Math - October 6
pballew.blogspot.com·15h·
📐Interval Arithmetic
Rigorous Evaluation of Microarchitectural Side-Channels with Statistical Model Checking
arxiv.org·16h
🔧Hardware Verification
Panther Lake leak: Intel's Core Ultra 9 X388H packs 16 CPU / 12 GPU cores
techspot.com·3h
CPU Microarchitecture
Fitting It All in Your Head
systemsapproach.org·12h
📡BGP Archaeology
From engines to nanochips: Physicists redefine how heat really moves
phys.org·3h
⚛️Information Physics
A grand week
blog.mitrichev.ch·1d·
🧮SMT Solvers
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·8h
🔐Cryptographic Archaeology