4586
JAVA and SIMD - Prestodb rocks!
I have wanted to experiment with Java for a long time to find out whether or not it can take advantage of Single Instruction, Multiple Data (SIMD) instructions to speed up CPU-intensive computations. I found very little information while I was researching this, so I decided to share my own findings.
java 
16 hours ago
Please, enough with the dead butterflies! – Emily S. Damstra
We all have pet peeves, even though there’s a lot going on in the world that makes them pretty insignificant. While acknowledging that there are many more important things in life, I write th…
3 days ago
Popcorn Linux - Home
The Popcorn Linux project is exploring how to improve the scalability of operating systems, Linux in particular, on future multi- and many-core hardware platforms, and how to design operating systems for Instruction Set Architecture (ISA)-diverse multi/many-core architectures. Additionally, the project is exploring how to automatically compile/synthesize/execute code on ISA-heterogeneous hardware.
unix 
6 days ago
SIMD / GPU Friendly Branchless Binary Search | The blog at the bottom of the sea on WordPress.com
The other day I was thinking about how you might do a binary search branchlessly. I came up with a way, and I'm pretty sure I'm not the first to come up with it, but it was fun to think about and I wanted to share my solution. Here it is searching a list of…
algo 
7 days ago
vendu/wizardcode
Wizard Code is my take on machine programming. The book discusses the C language in depth from a low-level programmer's perspective. You will get familiar with how Unix-like systems execute code, how C code is translated to assembly (and later, trivially, to machine language), and such advanced topics.
c 
8 days ago
coolHue - Coolest Gradient Hues and Swatches by UVdesk
Coolest handpicked Gradient Hues and Swatches for your next super amazing stuff
design  tools 
10 days ago
programming-tlabuffer.html
Unlike Buridan’s ass (and more like nondeterministic Turing machines), TLC does not get stuck between possibilities
10 days ago
Towards A Safer Footgun | codahale.com
let’s assume we’ve got a web application running on a bunch of independent servers and we’re using AES-GCM or ChaCha20-Poly1305 to secure something in each request with a shared key. At 100 requests a second, we won’t need to rotate keys for 16 months. At 1,000 requests per second, we’ll need to rotate keys every 50 days or so. At 10,000 requests per second, we’ll be rotating keys more than once a week. At 100,000 requests per second, we’ll be rotating keys more than twice a day.

What’s a developer to do?
security 
17 days ago
A Brief History of the UUID · Segment Blog
Today we’re releasing ksuid, a Golang library for unique ID generation. It borrows core ideas from the ubiquitous UUID standard, adding time-based ordering and more friendly representation formats. In doing the research that went into this library, we uncovered a compelling story that we wanted to share with a larger audience.
18 days ago
A Proof of Stake Design Philosophy – Vitalik Buterin – Medium
Systems like Ethereum (and Bitcoin, and NXT, and Bitshares, etc) are a fundamentally new class of cryptoeconomic organisms — decentralized…
18 days ago
You Are Not Google – Bradfield
Software engineers go crazy for the most ridiculous things. We like to think that we’re hyper-rational, but when we have to choose a…
19 days ago
Speeding up builds on FreeBSD
If you’re repeatedly building components of the FreeBSD operating system - kernel, base or userland - you will be interested in optimizing the build duration.

in /etc/src-env.conf: WITH_DIRDEPS_BUILD=yes
unix 
19 days ago
Working with time in Postgres - Craig Kerstiens
A massive amount of reporting queries, whether really intensive data analysis, or just basic insights into your business involving looking at data …
postgres 
19 days ago
Breaking out with CSS Grid explained
I spotted a nice technique to break an item out of a container. In this post I attempt to explain why that works.
css 
20 days ago
The "Blur Up" Technique for Loading Background Images | CSS-Tricks
The following is a guest post by Emil Björklund. Filter effects in CSS have been around for a while, and together with things like blend modes, they bring
css  svg 
20 days ago
Using UI System Fonts In Web Design: A Quick Practical Guide
System fonts are a fresh alternative to web typography that doesn’t require a font delivery service or files stored. Read more »
css 
26 days ago
Are Mutable References Fast? – Jonathan Fischoff – Medium
I was profiling a simple loop (years ago). It was similar to:
haskell 
26 days ago
únicode is hard – Terence Eden's Blog
In the last couple of months, I’ve been seeing the ú symbol on British receipts. Why? 1963 – ASCII In the beginning* was ASCII. A standard way for computers to exchange text. ASCII…
unicode 
29 days ago
TLA+ in Practice and Theory<br>Part 1: The Principles of TLA+
TLA+ is a formal specification and verification language intended to help engineers specify, design and reason about complex, real-life algorithms and software or hardware systems. We explore its motivation, application and principles of design.
4 weeks ago
Quick Guide to BSOD Codes For Overclocking | Play3r
So you’re overclocking or tweaking your system and you get that ‘dreaded’ blue screen of death; but what does it exactly mean? We have compiled the most common BSOD codes when overclocking and how to…
overclocking 
5 weeks ago
Pushing Polygons on the Mega Drive
This is a write-up of the polygon renderer used for the Mega Drive demo “Overdrive 2” by Titan, released at the Revision 2017 Demoparty. As the Mega Drive can only display tilemaps, not bitmaps, and does not have the video memory mapped into the CPU address space, this turned out to be an interesting problem. If you have not seen the demo yet, I recommend watching it before continuing. You can find a hardware capture on YouTube:
graphics  hardware 
6 weeks ago
Lessons Learned – Scala Design Failure: Implicit Numeric Conversions
TL;DR: The desire to make unrelated types act as if they were in asub-typing relationship, which neither exists nor should exist, combined withsyntax sugar t...
scala  pl 
6 weeks ago
Elixir's Secret Weapon
I recently began using a new(ish) feature of Elixir that completely transformed the way I build programs. I'm talking about the special form with. It can feel unfamiliar at first, but it is extremely powerful and flexible. This article will explain how with works and how it can be
elixir 
6 weeks ago
Nginx resolver vulnerabilities allow cache poisoning attack
Never configure nginx with the resolver directive pointing toa resolver on the Internet like Google Public DNS, OpenDNS, or your ISP’sresolver. Many nginx us...
security 
6 weeks ago
Beware of Transparent Pixels - Adrian Courrèges
If you use sprites with transparency in your game — and you most likely do for the UI at least — you’ll probably want to pay …
graphics 
6 weeks ago
USB Type-C and power delivery 101 – Ports and connections | Embedded
When paired with the new Power Delivery (PD) specification, Type-C offers enhancements to the existing USB 3.1 interconnect that lower the cost...
7 weeks ago
Maintainers make the world go round – PROJECT M
Innovation is an overrated ideology, say historians of technology. Maintenance means more to most peoples’ lives
7 weeks ago
IPv6 as a metadata store
Donatas Abraitis ton31337 Performance Networking
7 weeks ago
Some Notes on Haskell Pedagogy – Steven Syrek – Medium
This article is meant to accompany What a Haskell Study Group is Not, where I offer what wisdom I have on how best to collaborate on learning this many-layered language. Here, I broadly outline what…
haskell 
7 weeks ago
Rust and File Descriptors
I'm working on a program in Rust that for various reasons needs to pass data to a child process using a file descriptor. This is an odd pattern that exists in some old Unix programs. Normally, a program will accept input in the form of command-line arguments, files, or standard
rust 
8 weeks ago
Closing Communities: FFFFOUND! vs MLKSHK – Waxy.org
Seminal image-sharing communities FFFFOUND! and MLKSHK are shutting down next month—in very different ways.
8 weeks ago
Postgres tips for Rails developers | Citus Data
Citus Cloud offers a managed database-as-a-service for easy horizontal scaling of postgres.
postgres 
8 weeks ago
Troy Hunt: Random thoughts on the use of breach data for protection of accounts
Someone sent me an email today which essentially boiled down to this: Hey, Microsoft's Azure Active Directory alerted me to leaked credentials but won't give me any details so there's very little I can do about it This is a really interesting scenario and it relates to the way Microsoft
security 
8 weeks ago
Troy Hunt: Reckon you've seen some stupid security things? Here, hold my beer...
My mate Lars Klint shared this tweet the other day: Your password is not unique. pic.twitter.com/ga4GwxtzrQ— Lars Klint (@larsklint) April 16, 2017 Naturally, I passed it on because let's face it, that's some crazy shit going on right there. To which the Twitters responded with equal
security 
8 weeks ago
Lifts for free: making mtl typeclasses derivable
Perhaps the most important abstraction a Haskell programmer must understand to effectively write modern Haskell code, beyond the level of the monad, is the _monad transformer_, a way to compose monads together in a limited fashion. One frustrating downsid...
haskell 
8 weeks ago
Fathom: a framework for understanding web pages ★ Mozilla Hacks – the Web developer blog
Meet Fathom, a mini-language for writing semantic extractors, that you can use client- or server-side to extract meaning from the content of a web page. ...
8 weeks ago
Can signalfd be fixed? I think it can, if we explicitly tie signalfd into th... | Hacker News
Comment: "…a classic distinction between Linux and everybody else: Linux makes the common things blazingly fast and easy but makes it difficult to write resilient software, or to implement novel solutions not conceived of originally."
unix 
8 weeks ago
Linux Programming - Signals the easy way
Linux Programming - Signals the easy way
unix 
8 weeks ago
Windows is Bloated, Thanks to Adobe's Extensible Metadata Platform - Thurrott.com
I put together a tool that scans files for PNG images containing Adobe metadata and was surprised that Windows is host to a lot of this gunk.
9 weeks ago
« earlier      
accessibility admin algo android apple audio c clojure content css culture design devops django dotnet elixir emacs erlang fun gc gimp git golang graphics hardware haskell java javascript kotlin latex math music mysql nethack networking ocaml overclocking photoshop php pl postgres privacy prolog python redis ruby rust scala security smalltalk svg swift talk tools typography unicode unix via:bfin via:gohai via:macdrifter via:sunpig via:tlockney video vim webdev windows zfs

Copy this bookmark:



description:


tags: