Performance Archaeology, Access Patterns, Memory Hierarchies, Optimization Forensics

The Library Method: Understanding @cache
dev.to·1d·
Discuss: DEV
Cache Theory
Announcing coreboot 25.09 release
blogs.coreboot.org·2h
🔌Operating system internals
Profiling Your Code: 5 Tips to Significantly Boost Performance
usenix.org·1d
📊Performance Profiling
Can AI Co-Design Distributed Systems? Scaling from 1 GPU to 1k
harvard-edge.github.io·4h·
Discuss: Hacker News
🎯Performance Proofs
GoMem is a high-performance memory allocator library for Go
github.com·1d
🧠Memory Allocators
How to Tame Varnish Memory Usage Safely
fastly.com·2d
🎯Performance Forensics
OBCache: Optimal Brain KV Cache Pruning for Efficient Long-Context LLM Inference
arxiv.org·22h
💻Local LLMs
Z8 G4 - 768gb RAM - CPU inference?
reddit.com·1d·
Discuss: r/homelab
🖥️Modern CPU
An enough week
blog.mitrichev.ch·1d·
🧮Z3 Solver
From Static Rate Limiting to Adaptive Traffic Management in Airbnb’s Key-Value Store
medium.com·1d
🌊Streaming Systems
CPU Cache-Friendly Data Structures in Go: 10x Speed with Same Algorithm
skoredin.pro·4d·
💨Cache Optimization
Learning from software errors – Part 3: A Mars probe gets out of control
heise.de·18h
📞Session Types
Hardware Vulnerability Allows Attackers to Hack AI Training Data – NC State News
news.ncsu.edu·5h·
Discuss: Hacker News
🔐RISC-V Cryptography
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.com·2d
🧬PostgreSQL Forensics
Construction of new 1130 MRAM memory board completed
rescue1130.blogspot.com·7h·
🛠️Greaseweazle
Interviewing Intel's Chief Architect of x86 Cores
chipsandcheese.com·1d·
🧲RISC-V Archaeology
Creating Real-Time Multimodal AI Pipelines: Scaling File Processing to 50M Daily Uploads
engineering.salesforce.com·2h
🌊Stream Processing
Att&Df: Update the Operating System's "Dead Drop"
zenodo.org·1d·
Discuss: Hacker News
🛡️eBPF Security
When AI Remembers Too Much – Persistent Behaviors in Agents’ Memory
unit42.paloaltonetworks.com·1d
🔲Cellular Automata