Timing Attacks and Their Remedies — an in-depth guide
dev.to·2h·
Discuss: DEV
⏲️Time Synchronization
Tuning guide for AMD Amazon EC2 instances
aws.amazon.com·8h
📈Performance Profiling
Show HN: Flo Is a Rust/Vulkan 3D Renderer for the Bevy Game Engine
github.com·1h·
Discuss: Hacker News
📊Columnar Engines
A modified RIME algorithm with covariance learning and diversity enhancement for numerical optimization
arxiv.org·23h
🐜Swarm Intelligence
A Breadboard Computer in Three Chips
hackaday.com·7h
🏗️Hardware Architecture
Need Speed in Python? When to Use Threading vs. Multiprocessing.
dev.to·9h·
Discuss: DEV
🧠Memory Management
Your APIs Are Costing More Than You Think
thenewstack.io·10h
👁️Observability
Atom-thin crystals provide new way to power the future of computer memory
phys.org·13h
🧬Quantum Biology
This username is already taken! (Bloom filters)
dev.to·12h·
Discuss: DEV
📇Indexing Strategies
AlloyDB on Axion-powered C4A instances is generally available
cloud.google.com·10h
📊Column Stores
VMScape: Exploiting Incomplete Branch Predictor Isolation in Cloud Environments
comsec.ethz.ch·22h·
🛡️Memory Safety
Low-Rank Attention: Scaling Transformers Without the Quadratic Cost
lightcapai.medium.com·11h·
Discuss: Hacker News
🤖AI
Many hard LeetCode problems are easy constraint problems
dev.to·1h·
Discuss: DEV
🔢NumPy
The Capability-Tractability Tradeoff (2023)
buttondown.com·6h·
Discuss: Hacker News
🛡️Memory Safety
A review of solar dish applications: thermal utilization, thermochemistry, polygeneration and multi-energy complementary systems
sciencedirect.com·10h
🗂️HDF5
Understanding Floating-Point Numbers
dennisforbes.ca·15h·
Discuss: Hacker News
🔢NumPy
Optimizing 100B ClickHouse Events
replo.computer·22h·
Discuss: Hacker News
ClickHouse
Recon2012: Reverse engineering of binary programs for custom virtual machines
recon.cx·19h·
Discuss: Hacker News
🦠Malware Analysis
Day 28: The 10x Performance Breakthrough
dev.to·9h·
Discuss: DEV
DataFusion
VaultGemma: The world's most capable differentially private LLM
research.google·18h·
🔐Privacy Engineering