Performance Archaeology, Access Patterns, Memory Hierarchies, Optimization Forensics

The Library Method: Understanding @cache
dev.to·22h·
Discuss: DEV
Cache Theory
Profiling Your Code: 5 Tips to Significantly Boost Performance
usenix.org·21h
📊Performance Profiling
Can AI Co-Design Distributed Systems? Scaling from 1 GPU to 1k
harvard-edge.github.io·1h·
Discuss: Hacker News
🎯Performance Proofs
How to Tame Varnish Memory Usage Safely
fastly.com·1d
🎯Performance Forensics
Z8 G4 - 768gb RAM - CPU inference?
reddit.com·1d·
Discuss: r/homelab
🖥️Modern CPU
GoMem is a high-performance memory allocator library for Go
github.com·21h
🧠Memory Allocators
OBCache: Optimal Brain KV Cache Pruning for Efficient Long-Context LLM Inference
arxiv.org·19h
💻Local LLMs
An enough week
blog.mitrichev.ch·1d·
🧮Z3 Solver
From Static Rate Limiting to Adaptive Traffic Management in Airbnb’s Key-Value Store
medium.com·1d
🌊Streaming Systems
CPU Cache-Friendly Data Structures in Go: 10x Speed with Same Algorithm
skoredin.pro·4d·
💨Cache Optimization
Construction of new 1130 MRAM memory board completed
rescue1130.blogspot.com·4h·
🛠️Greaseweazle
Learning from software errors – Part 3: A Mars probe gets out of control
heise.de·15h
📞Session Types
Hardware Vulnerability Allows Attackers to Hack AI Training Data – NC State News
news.ncsu.edu·2h·
Discuss: Hacker News
🔐RISC-V Cryptography
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.com·2d
🧬PostgreSQL Forensics
Intel signals strong comeback with next-gen Core Ultra 3 and Xeon 6+ chips
techspot.com·1d
🖥️Terminal Renaissance
Interviewing Intel's Chief Architect of x86 Cores
chipsandcheese.com·1d·
🧲RISC-V Archaeology
When AI Remembers Too Much – Persistent Behaviors in Agents’ Memory
unit42.paloaltonetworks.com·1d
🔲Cellular Automata
Att&Df: Update the Operating System's "Dead Drop"
zenodo.org·1d·
Discuss: Hacker News
🛡️eBPF Security
We Benchmarked DuckDB, SQLite, and Pandas on 1M Rows: Here’s What Happened
kdnuggets.com·9h
💾SQLite