Explore >> Select a destination


You are here

mattkeeter.com
| | ochagavia.nl
15.4 parsecs away

Travel
| | It's time to present the solution to the JIT calculator challenge! If you missed it, here's the original post in which I introduced it. It was a nice excuse to finally learn more about JIT compilation! I wasn't alone in this, many people were nerd-sniped into implementing their own solutions and sent me their submissions. Thanks for participating! I'll discuss them in a third blog post, to keep this one from becoming too long.
| | intezer.com
15.5 parsecs away

Travel
| | Reverse engineering is an integral part of malware analysis and research - get started learning this advanced skill to investigate malware.
| | coredumped.dev
15.4 parsecs away

Travel
| | In this post, we are going to take a deep dive into pointer tagging, where metadata is encoded into a word-sized pointer. Doing so allows us to keep a compact representation that can be passed around in machine registers. This is very common in implementing dynamic programming languages, but can really be used anywhere that additional runtime information is needed about a pointer. We will look at a handful of different ways these pointers can be encoded and see how the compiler can optimize them for diff...
| | www.shuttle.rs
72.7 parsecs away

Travel
| Learn about using the Rig LLM framework to be able to create AI agents for assisted research via arXiv.