Allocator Wrestling
https://about.sourcegraph.com/go/gophercon-2018-allocator-wrestling/ [about.sourcegraph.com]
2018-08-31 16:01
tags:
garbage-collection
go
malloc
perf
programming
A whirlwind tour of the Go memory allocator and garbage collector, with tools and tips on how to optimize.
Rather deep for a whirlwind tour.
source: L
Azure Data Lake Store: a hyperscale distributed file service for big data analytics
https://blog.acolyer.org/2017/07/04/azure-data-lake-store-a-hyperscale-distributed-file-service-for-big-data-analytics/ [blog.acolyer.org]
2017-07-04 07:20
tags:
cloud
fs
paper
storage
ADLS is the first public PaaS cloud service that is designed to support full filesystem functionality at extreme scale.
Ars Technica’s best games of 2018
https://arstechnica.com/gaming/2018/12/ars-technicas-best-games-of-2018/ [arstechnica.com]
2018-12-25 04:41
tags:
gaming
links
Running through this year’s list of video games that made the most impact on the Ars staff, I’m struck by the sheer variety. Sure, there’s the usual selection of open world adventures and slick action games. But there are also a handful of fresh takes on the puzzle game genre, a few promising virtual reality games, a relatively wide variety of 2D platformers, racing games that run the gamut from realistic to campy, a couple of fighting games, and even a rhythm game!
20 more ways to spend time and money.
Decades-Long Quest Reveals Details of the Proton’s Inner Antimatter
https://www.quantamagazine.org/protons-antimatter-revealed-by-decades-old-experiment-20210224/ [www.quantamagazine.org]
2021-02-25 01:36
tags:
article
paper
physics
science
Twenty years ago, physicists set out to investigate a mysterious asymmetry in the proton’s interior. Their results, published today, show how antimatter helps stabilize every atom’s core.
We learn in school that a proton is a bundle of three elementary particles called quarks — two “up” quarks and a “down” quark, whose electric charges (+2/3 and −1/3, respectively) combine to give the proton its charge of +1. But that simplistic picture glosses over a far stranger, as-yet-unresolved story.
In reality, the proton’s interior swirls with a fluctuating number of six kinds of quarks, their oppositely charged antimatter counterparts (antiquarks), and “gluon” particles that bind the others together, morph into them and readily multiply. Somehow, the roiling maelstrom winds up perfectly stable and superficially simple — mimicking, in certain respects, a trio of quarks.
paper: https://www.nature.com/articles/s41586-021-03282-z
source: HN
Add a const here, delete a const there…
https://randomascii.wordpress.com/2017/01/08/add-a-const-here-delete-a-const-there/ [randomascii.wordpress.com]
2017-01-09 13:51
tags:
c
compiler
perf
programming
I just completed a series of changes that shrunk the Chrome browser’s on-disk size on Windows by over a megabyte, moved about 500 KB of data from its read/write data segments to its read-only data segments, and reduced its private working set by about 200 KB per-process.
Why is memory reclamation so important?
https://concurrencyfreaks.blogspot.com/2017/08/why-is-memory-reclamation-so-important.html [concurrencyfreaks.blogspot.com]
2017-09-18 02:31
tags:
compsci
concurrency
garbage-collection
perf
As it so happens, object lifetime tracking (or Memory Reclamation as I prefer to call it) is the current most difficult open problem in shared memory concurrency. If you want to design or implement a lock-free or wait-free data structure, the hardest part isn’t designing/implementing the data structure itself. The hardest task is to add memory reclamation to this data structure, without reducing the progress or throughput of the data structure you designed/implemented.
source: HN
Rashomon of disclosure
http://addxorrol.blogspot.com/2019/08/rashomon-of-disclosure.html [addxorrol.blogspot.com]
2019-08-17 19:01
tags:
article
development
security
In a world of changing technology, there are few constants - but if there is one constant in security, it is the rhythmic flare-up of discussions about disclosure on the social-media-du-jour (mailing lists in the past, now mostly Twitter and Facebook).
In this blog post, I would like to highlight a few aspects of the discussion that are important to me personally - aspects which influenced my thinking, and which are underappreciated in my view.
source: grugq
ARM immediate value encoding
https://alisdair.mcdiarmid.org/arm-immediate-value-encoding/ [alisdair.mcdiarmid.org]
2017-06-15 21:29
tags:
cpu
programming
Making up for lost bits.
source: grugq
Ruby 2.x Universal RCE Deserialization Gadget Chain
https://www.elttam.com.au/blog/ruby-deserialization/ [www.elttam.com.au]
2018-11-09 04:20
tags:
exploit
format
library
programming
ruby
security
turtles
This blog post details exploitation of arbitrary deserialization for the Ruby programming language and releases the first public universal gadget chain to achieve arbitrary command execution for Ruby 2.x. This will be described in the following sections which detail deserialization issues and related work, discovery of usable gadget chains, and finally exploitation of ruby serialization.
source: HN
Why don’t I get a broken pipe when the child process terminates?
https://blogs.msdn.microsoft.com/oldnewthing/20161207-00/?p=94875 [blogs.msdn.microsoft.com]
2016-12-07 20:48
tags:
c
programming
unix
windows
Because it’s still open in the parent. Same problem arises on unix as well.
The Optimal Distribution of Population across Cities
http://davidalbouy.net/optimalcitysize.pdf [davidalbouy.net]
2016-11-20 07:17
tags:
paper
pdf
policy
urban
Bigger is better! Given a few assumptions...
The mystery of the lost Roman herb
http://www.bbc.com/future/story/20170907-the-mystery-of-the-lost-roman-herb [www.bbc.com]
2017-09-11 01:24
tags:
article
biology
food
history
Plus lasers and huckleberries.
source: MR
OpenSMTPD advisory dissected
https://poolp.org/posts/2020-01-30/opensmtpd-advisory-dissected/ [poolp.org]
2020-01-31 21:13
tags:
bugfix
development
email
exploit
openbsd
programming
security
turtles
Qualys contacted by e-mail to tell me they found a vulnerability in OpenSMTPD and would send me the encrypted draft for advisory. Receiving this kind of e-mail when working on a daemon that can’t revoke completely privileges is not a thing you want to read, particularly when you know how efficient they are at spotting a small bug and leveraging into a full-fledged clusterfuck.
Legacy code bad, even when it’s freshly written legacy code.
Amazon wants a key to your house. I did it. I regretted it.
https://www.washingtonpost.com/news/the-switch/wp/2017/12/07/amazon-wants-a-key-to-your-house-i-did-it-i-regretted-it/ [www.washingtonpost.com]
2017-12-07 21:08
tags:
business
ioshit
valley
After two weeks, it turns out letting strangers in has been the least-troubling part of the experience. Once Amazon owned my door, I was the one locked into an all-Amazon world.
source: HN
Random Postgres Things
http://malisper.me/ [malisper.me]
2017-05-26 09:59
tags:
database
series
sql
Learn new things about postgres.
source: danluu
How I experience the web today
https://how-i-experience-web-today.com/ [how-i-experience-web-today.com]
2022-04-19 22:45
tags:
browser
business
design
development
essay
interactive
ux
web
An interactive experience!
source: DF
Unicode programming, with examples
https://begriffs.com/posts/2019-05-23-unicode-icu.html [begriffs.com]
2019-06-11 04:58
tags:
development
library
programming
standard
text
Unicode is more than a numbering scheme for the characters of every language – although that in itself is a useful accomplishment. Unicode also includes characters’ case, directionality, and alphabetic properties. The Unicode standard and specifications describe the proper way to divide words and break lines, sort text, format numbers, display text in different directions, split/combine/reorder vowels South Asian languages, and determine when characters may look visually confusable.
source: HN
It's Too Complicated: Electronic Surveillance Law
https://www.cs.columbia.edu/~smb/papers/internet-3rd-party.pdf [www.cs.columbia.edu]
2016-11-09 23:34
tags:
life
networking
opsec
paper
pdf
policy
turtles
The third party doctrine is obsolete. 88 pages of legal commentary and citations.
Steve Teles and Brink Lindsey on *The Captured Economy*
https://medium.com/conversations-with-tyler/steve-teles-brink-lindsey-captured-economy-tyler-cowen-3290440f97a0 [medium.com]
2017-11-15 02:59
tags:
academia
book
finance
interview
policy
What happens when a liberal and a libertarian get together? In the case of Steve Teles and Brink Lindsey, they write a book. And then Tyler separates them for a podcast interview about that book, prisoner’s dilemma style.
source: MR
Prepare for the New Paywall Era
https://www.theatlantic.com/technology/archive/2017/11/the-big-unanswered-questions-about-paywalls/547091/ [www.theatlantic.com]
2017-12-04 04:53
tags:
business
media
web
The first time around, many paywalls simply did not work. But times have changed. The New York Times’ success in transforming itself into a company that is markedly less dependent on advertising than it has been in recent years has emboldened many other publishers. The Times now makes more than 20 percent of its revenue on digital-only subscriptions, a number which has been growing quickly.