You are here |
mattkeeter.com | ||
| | | |
ochagavia.nl
|
|
| | | | It's time to present the solution to the JIT calculator challenge! If you missed it, here's the original post in which I introduced it. It was a nice excuse to finally learn more about JIT compilation! I wasn't alone in this, many people were nerd-sniped into implementing their own solutions and sent me their submissions. Thanks for participating! I'll discuss them in a third blog post, to keep this one from becoming too long. | |
| | | |
intezer.com
|
|
| | | | Reverse engineering is an integral part of malware analysis and research - get started learning this advanced skill to investigate malware. | |
| | | |
coredumped.dev
|
|
| | | | In this post, we are going to take a deep dive into pointer tagging, where metadata is encoded into a word-sized pointer. Doing so allows us to keep a compact representation that can be passed around in machine registers. This is very common in implementing dynamic programming languages, but can really be used anywhere that additional runtime information is needed about a pointer. We will look at a handful of different ways these pointers can be encoded and see how the compiler can optimize them for diff... | |
| | | |
www.shuttle.rs
|
|
| | Learn about using the Rig LLM framework to be able to create AI agents for assisted research via arXiv. |