Performance Archaeology, Access Patterns, Memory Hierarchies, Optimization Forensics

Myths Programmers Believe about CPU Caches
software.rajivprab.com·3h·
Discuss: Hacker News
Cache Coherence
Flag this post
MLPrE -- A tool for preprocessing and exploratory data analysis prior to machine learning model construction
arxiv.org·1d
🎵Audio ML
Flag this post
🚀 Go Faster: Cutting the Slack in GC with Smart Memory Allocation
dev.to·1d·
Discuss: DEV
🧠Memory Allocators
Flag this post
A hitchhiker's guide to CUDA programming
seanzhang.me·8h·
Discuss: Hacker News
SIMD Vectorization
Flag this post
Continuous Performance Testing: staying fast
tweag.io·1d
🎯Performance Forensics
Flag this post
HeraclesQL: A Python DSL for Writing Alerts
hudsonrivertrading.com·9h·
Discuss: Hacker News
Format Verification
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.com·10h
🌐DNS Security
Flag this post
OpenTelemetry Collector: The Backbone of Modern Observability Pipelines
blog.devops.dev·3d
👁️System Observability
Flag this post
No Cap, This Memory Slaps: Breaking Through the OLTP Memory Wall
danglingpointers.substack.com·12h·
Discuss: Substack
Hardware Transactional Memory
Flag this post
Improving performance by prefetching product pages from Etsy Search
etsy.com·1d·
Discuss: Hacker News
📊Feed Optimization
Flag this post
From Bottleneck to Breakthrough: AI in Chip Verification
spectrum.ieee.org·18h
🔧Hardware Verification
Flag this post
Opportunistically Parallel Lambda Calculus
dl.acm.org·6h·
Discuss: Hacker News
🔗Functional Compilers
Flag this post
MSAB Whitepaper – Investigating RAM In A Mobile Device
forensicfocus.com·14h
🧠Memory Forensics
Flag this post
Finding Order in the Mayhem: A Novel Concurrency Testing Tool that Improved the Kotlin Compiler
blog.jetbrains.com·1d·
Discuss: Hacker News
Effect Handlers
Flag this post
How We Found 7 TiB of Memory Just Sitting Around
render.com·13h·
Discuss: Hacker News
🔩Systems Programming
Flag this post
3 Minutes to Start Your Research in Nearest Neighbor Search
romanbikbulatov.bearblog.dev·1d·
Discuss: Hacker News
📏Range Queries
Flag this post
New Attack Targets DDR5 Memory to Steal Keys from Intel and AMD Tees
securityweek.com·1d·
Discuss: Hacker News
🔍RISC-V Forensics
Flag this post
Introducing SWE-1.5: Our Fast Agent Model
simonwillison.net·1d
🔒WASM Capabilities
Flag this post
Faster Database Queries: Practical Techniques
kapillamba4.medium.com·2d·
🚀Query Optimization
Flag this post
How fast can an LLM go?
fergusfinn.com·17h·
Discuss: Hacker News
🎯Emulator Accuracy
Flag this post