Published on: 2025-06-12 22:24:56
@another, @mstorsjo, @gramner Introduction I noticed a very clickbait bounty, I initially realized that company's original task was not to overtake implementation, but to advertise that Rust is 5% slower than C. Whether she actually pays or not is another matter. The main thing for Prossimo was to make a fuss that the current rav1d implementation was only 5% slower, so that the general public would think that the language was the same in speed. I also noticed contributor's blog who tried to o
Keywords: boundary bytes cacheline int struct
Find related items on AmazonPublished on: 2025-06-26 13:40:32
Poking through layers of indirection in go trying to recover some efficiency. Many functions in go take an io.Reader interface as input. This is a sensible default, allowing for streaming of data, instead of loading the entirety into memory. In some cases, though, we need the bytes. Which we may already have, in which case it would be great to simply use those bytes. Alas, this can be quite difficult. context I’m decoding some images. I’m using libavif and libheif via C bindings. For reasons
Keywords: byte bytes io peek reader
Find related items on AmazonPublished on: 2025-07-06 05:55:43
When GADTs (Generalized Algebraic Data Types) landed in OCaml, I wasn’t particularly happy about it. I assumed that it was the kind of nonsense you get when you let compiler writers design your programming language. Which is to say that the standard GADT examples all seem to be about the kinds of things that compiler writers do, like embed domain-specific languages or build typed abstract-syntax trees. But it didn’t seem particularly relevant for the kind of systems programming that I think abo
Keywords: array bytes length let type
Find related items on AmazonPublished on: 2025-07-31 02:19:00
Elyse Betters Picaro / ZDNET With viruses, ransomware, spyware, infostealers, and outright scams, online fraud has been a pervasive and growing problem. In the US, one in three people who reported fraud last year lost money, with the total collective amount reaching $12.5 billion. Now, security firm Malwarebytes is trying to combat these types of cybercrimes by providing security tools to a new host of partners. Also: 7 password rules security experts live by in 2025 - the last one might surpr
Keywords: customers malwarebytes protection security tools
Find related items on AmazonPublished on: 2025-07-31 17:19:00
Elyse Betters Picaro / ZDNET With viruses, ransomware, spyware, infostealers, and outright scams, online fraud has been a pervasive and growing problem. In the US, one in three people who reported fraud last year lost money, with the total collective amount reaching $12.5 billion. Now, security firm Malwarebytes is trying to combat these types of cybercrimes with its latest security tools. Also: 7 password rules security experts live by in 2025 - the last one might surprise you Aimed at finan
Keywords: malwarebytes online protection security tools
Find related items on AmazonPublished on: 2025-07-31 21:00:00
Internet terminology is often maddeningly confusing. Case in point: Megabits and megabytes. Both refer to units of digital information, but the difference is subtle enough to cause plenty of confusion. Knowing the difference between the two terminologies can make all the difference when picking out an internet plan or figuring out how quickly you can download a file. Don’t worry -- we’ll clear it all up so you never get scolded on Reddit again. Megabits vs. Megabytes It all starts with bits an
Keywords: internet mb megabits megabytes second
Find related items on AmazonPublished on: 2025-08-24 16:30:45
A surprising enum size optimization in the Rust compiler Enums are one of the most popular features in Rust. An enum is type whose value is one of a specified set of variants. /// Foo is either a 32-bit integer or character. enum Foo { Int(u32), Char(char), } Values of type Foo are either integers (e.g. the variant Foo::Int(3) with a payload of 3 ) or characters (e.g. the variant Foo::Char('A') with a payload of 'A' ). If you think of structs as being the and combination of their fields, enum
Keywords: 00 bytes inner type value
Find related items on AmazonPublished on: 2025-08-28 12:53:05
The next part of the Advent of Code puzzle involves interpreting instructions called do() and don't() which turn on and off the contributions of mul instructions to the sum. As we parse, we now need to keep track of one bit of state. This is a nightmare for regexes to deal with, because they recognise regular languages, and regular languages are literally stateless languages.2 There’s more nuance, of course, but as a first approximation. Technically regular languages are those that can be recogn
Keywords: bytestring import mul parser state
Find related items on AmazonPublished on: 2025-08-31 07:23:23
How “deleting multiplayer from the engine” can save memory Although the title of this article might suggest otherwise, I don’t dislike Unreal’s multiplayer features. As someone who has worked on two different multiplayer games in Unreal, I enjoy Unreal’s seamless multiplayer integration. It’s built deep into the engine instead of being moved to an optional plugin like so many other features. You can test any project in multiplayer mode without writing a single line of code. Of course, it will n
Keywords: bytes like multiplayer save unreal
Find related items on AmazonPublished on: 2025-09-10 08:28:52
Measuring acceleration structures Hardware accelerated raytracing, as supported by DirectX 12 and Vulkan, relies on an abstract data structure that stores scene geometry, known as “acceleration structure” and often referred to as “BVH” or “BLAS”. Unlike geometry representation for rasterization, rendering engines can not customize the data layout; unlike texture formats, the layout is not standardized across vendors. It may seem like a trivial matter - surely, by 2025 all implementations are c
Keywords: bytes node nodes triangle triangles
Find related items on AmazonPublished on: 2025-09-26 06:00:00
The internet is massive. But does it have … actual mass? Big server farms and miles of fiber-optic cables do, of course, but we don’t mean the infrastructure of the internet. We mean the internet itself. The information. The data. The cybernetics. And because storing and moving stuff through cyberspace requires energy—which, per Einstein, has mass—it should, in theory, be possible to calculate the internet’s weight. Way back in the adolescent days of the web, in 2006, a Harvard physicist named
Keywords: bytes dna energy grams internet
Find related items on AmazonPublished on: 2025-09-27 08:37:23
Compound document file format Compound File Binary Format (CFBF), also called Compound File, Compound Document format,[1] or Composite Document File V2[2] (CDF), is a compound document file format for storing numerous files and streams within a single file on a disk. CFBF is developed by Microsoft and is an implementation of Microsoft COM Structured Storage.[3][4][5] The file format is used for storing storage objects and stream objects in a hierarchical structure within a single file.[6] Micr
Keywords: bytes fat file sector sectors
Find related items on AmazonPublished on: 2025-10-01 15:36:11
|| Paper | Model | Code || Screenshots of files generated by ByteCraft Contents: ByteCraft, Examples, The future ByteCraft Imagine a world where you can write a prompt describing a video game or animation that you want, and a fully fledged executable file comes out. We take the first attempt at this crazy goal by training a model to generate the bytes of video games and animations! The first 128 bytes of a 15Kb game Our model, 🎮ByteCraft, was made by fine-tuning a 7B parameter LLM (Qwen2.5
Keywords: bytecraft bytes file files molecules
Find related items on AmazonPublished on: 2025-10-13 16:15:05
ZDNET A persistent malware campaign is exploiting the ubiquitous CAPTCHA process to try to steal data from unsuspecting victims. Also: Got a suspicious E-ZPass text? It's a trap - how to spot the scam As described by security firm Malwarebytes in a new report, this scheme relies on the ease with which people often follow the steps in a CAPTCHA prompt without thinking. How the attack works You land on a website that promises movies, music, pictures, news articles, or some other interesting c
Keywords: captcha click disable javascript malwarebytes
Find related items on AmazonPublished on: 2025-10-29 19:03:03
This week-end project started by browsing the open-data repository of Paris’ public transport network, which contains various APIs to query real-time departures, current disruptions, etc. The data reuse section caught my eye, as it features external projects that use this open data. In particular, the RATP status website provides a really nice interface to visualize historical disruptions on metro, RER/train and tramway lines. A usual day of disruptions on ratpstatus.fr. Under the hood, the ra
Keywords: bytes interner object objects self
Find related items on AmazonPublished on: 2025-10-30 10:03:03
This week-end project started by browsing the open-data repository of Paris’ public transport network, which contains various APIs to query real-time departures, current disruptions, etc. The data reuse section caught my eye, as it features external projects that use this open data. In particular, the RATP status website provides a really nice interface to visualize historical disruptions on metro, RER/train and tramway lines. A usual day of disruptions on ratpstatus.fr. Under the hood, the ra
Keywords: bytes interner object objects self
Find related items on AmazonGo K’awiil is a project by nerdhub.co that curates technology news from a variety of trusted sources. We built this site because, although news aggregation is incredibly useful, many platforms are cluttered with intrusive ads and heavy JavaScript that can make mobile browsing a hassle. By hand-selecting our favorite tech news outlets, we’ve created a cleaner, more mobile-friendly experience.
Your privacy is important to us. Go K’awiil does not use analytics tools such as Facebook Pixel or Google Analytics. The only tracking occurs through affiliate links to amazon.com, which are tagged with our Amazon affiliate code, helping us earn a small commission.
We are not currently offering ad space. However, if you’re interested in advertising with us, please get in touch at [email protected] and we’ll be happy to review your submission.